1*076a95f5SAlan Maguire // SPDX-License-Identifier: GPL-2.0 2*076a95f5SAlan Maguire /* Copyright (c) 2020, Oracle and/or its affiliates. */ 3*076a95f5SAlan Maguire 4*076a95f5SAlan Maguire #include "vmlinux.h" 5*076a95f5SAlan Maguire #include <bpf/bpf_helpers.h> 6*076a95f5SAlan Maguire #include <bpf/bpf_tracing.h> 7*076a95f5SAlan Maguire #include <bpf/bpf_core_read.h> 8*076a95f5SAlan Maguire 9*076a95f5SAlan Maguire #include <errno.h> 10*076a95f5SAlan Maguire 11*076a95f5SAlan Maguire long ret = 0; 12*076a95f5SAlan Maguire int num_subtests = 0; 13*076a95f5SAlan Maguire int ran_subtests = 0; 14*076a95f5SAlan Maguire bool skip = false; 15*076a95f5SAlan Maguire 16*076a95f5SAlan Maguire #define STRSIZE 2048 17*076a95f5SAlan Maguire #define EXPECTED_STRSIZE 256 18*076a95f5SAlan Maguire 19*076a95f5SAlan Maguire #ifndef ARRAY_SIZE 20*076a95f5SAlan Maguire #define ARRAY_SIZE(x) (sizeof(x) / sizeof((x)[0])) 21*076a95f5SAlan Maguire #endif 22*076a95f5SAlan Maguire 23*076a95f5SAlan Maguire struct { 24*076a95f5SAlan Maguire __uint(type, BPF_MAP_TYPE_PERCPU_ARRAY); 25*076a95f5SAlan Maguire __uint(max_entries, 1); 26*076a95f5SAlan Maguire __type(key, __u32); 27*076a95f5SAlan Maguire __type(value, char[STRSIZE]); 28*076a95f5SAlan Maguire } strdata SEC(".maps"); 29*076a95f5SAlan Maguire 30*076a95f5SAlan Maguire static int __strncmp(const void *m1, const void *m2, size_t len) 31*076a95f5SAlan Maguire { 32*076a95f5SAlan Maguire const unsigned char *s1 = m1; 33*076a95f5SAlan Maguire const unsigned char *s2 = m2; 34*076a95f5SAlan Maguire int i, delta = 0; 35*076a95f5SAlan Maguire 36*076a95f5SAlan Maguire for (i = 0; i < len; i++) { 37*076a95f5SAlan Maguire delta = s1[i] - s2[i]; 38*076a95f5SAlan Maguire if (delta || s1[i] == 0 || s2[i] == 0) 39*076a95f5SAlan Maguire break; 40*076a95f5SAlan Maguire } 41*076a95f5SAlan Maguire return delta; 42*076a95f5SAlan Maguire } 43*076a95f5SAlan Maguire 44*076a95f5SAlan Maguire #if __has_builtin(__builtin_btf_type_id) 45*076a95f5SAlan Maguire #define TEST_BTF(_str, _type, _flags, _expected, ...) \ 46*076a95f5SAlan Maguire do { \ 47*076a95f5SAlan Maguire static const char _expectedval[EXPECTED_STRSIZE] = \ 48*076a95f5SAlan Maguire _expected; \ 49*076a95f5SAlan Maguire static const char _ptrtype[64] = #_type; \ 50*076a95f5SAlan Maguire __u64 _hflags = _flags | BTF_F_COMPACT; \ 51*076a95f5SAlan Maguire static _type _ptrdata = __VA_ARGS__; \ 52*076a95f5SAlan Maguire static struct btf_ptr _ptr = { }; \ 53*076a95f5SAlan Maguire int _cmp; \ 54*076a95f5SAlan Maguire \ 55*076a95f5SAlan Maguire ++num_subtests; \ 56*076a95f5SAlan Maguire if (ret < 0) \ 57*076a95f5SAlan Maguire break; \ 58*076a95f5SAlan Maguire ++ran_subtests; \ 59*076a95f5SAlan Maguire _ptr.ptr = &_ptrdata; \ 60*076a95f5SAlan Maguire _ptr.type_id = bpf_core_type_id_kernel(_type); \ 61*076a95f5SAlan Maguire if (_ptr.type_id <= 0) { \ 62*076a95f5SAlan Maguire ret = -EINVAL; \ 63*076a95f5SAlan Maguire break; \ 64*076a95f5SAlan Maguire } \ 65*076a95f5SAlan Maguire ret = bpf_snprintf_btf(_str, STRSIZE, \ 66*076a95f5SAlan Maguire &_ptr, sizeof(_ptr), _hflags); \ 67*076a95f5SAlan Maguire if (ret) \ 68*076a95f5SAlan Maguire break; \ 69*076a95f5SAlan Maguire _cmp = __strncmp(_str, _expectedval, EXPECTED_STRSIZE); \ 70*076a95f5SAlan Maguire if (_cmp != 0) { \ 71*076a95f5SAlan Maguire bpf_printk("(%d) got %s", _cmp, _str); \ 72*076a95f5SAlan Maguire bpf_printk("(%d) expected %s", _cmp, \ 73*076a95f5SAlan Maguire _expectedval); \ 74*076a95f5SAlan Maguire ret = -EBADMSG; \ 75*076a95f5SAlan Maguire break; \ 76*076a95f5SAlan Maguire } \ 77*076a95f5SAlan Maguire } while (0) 78*076a95f5SAlan Maguire #endif 79*076a95f5SAlan Maguire 80*076a95f5SAlan Maguire /* Use where expected data string matches its stringified declaration */ 81*076a95f5SAlan Maguire #define TEST_BTF_C(_str, _type, _flags, ...) \ 82*076a95f5SAlan Maguire TEST_BTF(_str, _type, _flags, "(" #_type ")" #__VA_ARGS__, \ 83*076a95f5SAlan Maguire __VA_ARGS__) 84*076a95f5SAlan Maguire 85*076a95f5SAlan Maguire /* TRACE_EVENT(netif_receive_skb, 86*076a95f5SAlan Maguire * TP_PROTO(struct sk_buff *skb), 87*076a95f5SAlan Maguire */ 88*076a95f5SAlan Maguire SEC("tp_btf/netif_receive_skb") 89*076a95f5SAlan Maguire int BPF_PROG(trace_netif_receive_skb, struct sk_buff *skb) 90*076a95f5SAlan Maguire { 91*076a95f5SAlan Maguire static __u64 flags[] = { 0, BTF_F_COMPACT, BTF_F_ZERO, BTF_F_PTR_RAW, 92*076a95f5SAlan Maguire BTF_F_NONAME, BTF_F_COMPACT | BTF_F_ZERO | 93*076a95f5SAlan Maguire BTF_F_PTR_RAW | BTF_F_NONAME }; 94*076a95f5SAlan Maguire static struct btf_ptr p = { }; 95*076a95f5SAlan Maguire __u32 key = 0; 96*076a95f5SAlan Maguire int i, __ret; 97*076a95f5SAlan Maguire char *str; 98*076a95f5SAlan Maguire 99*076a95f5SAlan Maguire #if __has_builtin(__builtin_btf_type_id) 100*076a95f5SAlan Maguire str = bpf_map_lookup_elem(&strdata, &key); 101*076a95f5SAlan Maguire if (!str) 102*076a95f5SAlan Maguire return 0; 103*076a95f5SAlan Maguire 104*076a95f5SAlan Maguire /* Ensure we can write skb string representation */ 105*076a95f5SAlan Maguire p.type_id = bpf_core_type_id_kernel(struct sk_buff); 106*076a95f5SAlan Maguire p.ptr = skb; 107*076a95f5SAlan Maguire for (i = 0; i < ARRAY_SIZE(flags); i++) { 108*076a95f5SAlan Maguire ++num_subtests; 109*076a95f5SAlan Maguire ret = bpf_snprintf_btf(str, STRSIZE, &p, sizeof(p), 0); 110*076a95f5SAlan Maguire if (ret < 0) 111*076a95f5SAlan Maguire bpf_printk("returned %d when writing skb", ret); 112*076a95f5SAlan Maguire ++ran_subtests; 113*076a95f5SAlan Maguire } 114*076a95f5SAlan Maguire 115*076a95f5SAlan Maguire /* Check invalid ptr value */ 116*076a95f5SAlan Maguire p.ptr = 0; 117*076a95f5SAlan Maguire __ret = bpf_snprintf_btf(str, STRSIZE, &p, sizeof(p), 0); 118*076a95f5SAlan Maguire if (__ret >= 0) { 119*076a95f5SAlan Maguire bpf_printk("printing NULL should generate error, got (%d)", 120*076a95f5SAlan Maguire __ret); 121*076a95f5SAlan Maguire ret = -ERANGE; 122*076a95f5SAlan Maguire } 123*076a95f5SAlan Maguire 124*076a95f5SAlan Maguire /* Verify type display for various types. */ 125*076a95f5SAlan Maguire 126*076a95f5SAlan Maguire /* simple int */ 127*076a95f5SAlan Maguire TEST_BTF_C(str, int, 0, 1234); 128*076a95f5SAlan Maguire TEST_BTF(str, int, BTF_F_NONAME, "1234", 1234); 129*076a95f5SAlan Maguire /* zero value should be printed at toplevel */ 130*076a95f5SAlan Maguire TEST_BTF(str, int, 0, "(int)0", 0); 131*076a95f5SAlan Maguire TEST_BTF(str, int, BTF_F_NONAME, "0", 0); 132*076a95f5SAlan Maguire TEST_BTF(str, int, BTF_F_ZERO, "(int)0", 0); 133*076a95f5SAlan Maguire TEST_BTF(str, int, BTF_F_NONAME | BTF_F_ZERO, "0", 0); 134*076a95f5SAlan Maguire TEST_BTF_C(str, int, 0, -4567); 135*076a95f5SAlan Maguire TEST_BTF(str, int, BTF_F_NONAME, "-4567", -4567); 136*076a95f5SAlan Maguire 137*076a95f5SAlan Maguire /* simple char */ 138*076a95f5SAlan Maguire TEST_BTF_C(str, char, 0, 100); 139*076a95f5SAlan Maguire TEST_BTF(str, char, BTF_F_NONAME, "100", 100); 140*076a95f5SAlan Maguire /* zero value should be printed at toplevel */ 141*076a95f5SAlan Maguire TEST_BTF(str, char, 0, "(char)0", 0); 142*076a95f5SAlan Maguire TEST_BTF(str, char, BTF_F_NONAME, "0", 0); 143*076a95f5SAlan Maguire TEST_BTF(str, char, BTF_F_ZERO, "(char)0", 0); 144*076a95f5SAlan Maguire TEST_BTF(str, char, BTF_F_NONAME | BTF_F_ZERO, "0", 0); 145*076a95f5SAlan Maguire 146*076a95f5SAlan Maguire /* simple typedef */ 147*076a95f5SAlan Maguire TEST_BTF_C(str, uint64_t, 0, 100); 148*076a95f5SAlan Maguire TEST_BTF(str, u64, BTF_F_NONAME, "1", 1); 149*076a95f5SAlan Maguire /* zero value should be printed at toplevel */ 150*076a95f5SAlan Maguire TEST_BTF(str, u64, 0, "(u64)0", 0); 151*076a95f5SAlan Maguire TEST_BTF(str, u64, BTF_F_NONAME, "0", 0); 152*076a95f5SAlan Maguire TEST_BTF(str, u64, BTF_F_ZERO, "(u64)0", 0); 153*076a95f5SAlan Maguire TEST_BTF(str, u64, BTF_F_NONAME|BTF_F_ZERO, "0", 0); 154*076a95f5SAlan Maguire 155*076a95f5SAlan Maguire /* typedef struct */ 156*076a95f5SAlan Maguire TEST_BTF_C(str, atomic_t, 0, {.counter = (int)1,}); 157*076a95f5SAlan Maguire TEST_BTF(str, atomic_t, BTF_F_NONAME, "{1,}", {.counter = 1,}); 158*076a95f5SAlan Maguire /* typedef with 0 value should be printed at toplevel */ 159*076a95f5SAlan Maguire TEST_BTF(str, atomic_t, 0, "(atomic_t){}", {.counter = 0,}); 160*076a95f5SAlan Maguire TEST_BTF(str, atomic_t, BTF_F_NONAME, "{}", {.counter = 0,}); 161*076a95f5SAlan Maguire TEST_BTF(str, atomic_t, BTF_F_ZERO, "(atomic_t){.counter = (int)0,}", 162*076a95f5SAlan Maguire {.counter = 0,}); 163*076a95f5SAlan Maguire TEST_BTF(str, atomic_t, BTF_F_NONAME|BTF_F_ZERO, 164*076a95f5SAlan Maguire "{0,}", {.counter = 0,}); 165*076a95f5SAlan Maguire 166*076a95f5SAlan Maguire /* enum where enum value does (and does not) exist */ 167*076a95f5SAlan Maguire TEST_BTF_C(str, enum bpf_cmd, 0, BPF_MAP_CREATE); 168*076a95f5SAlan Maguire TEST_BTF(str, enum bpf_cmd, 0, "(enum bpf_cmd)BPF_MAP_CREATE", 0); 169*076a95f5SAlan Maguire TEST_BTF(str, enum bpf_cmd, BTF_F_NONAME, "BPF_MAP_CREATE", 170*076a95f5SAlan Maguire BPF_MAP_CREATE); 171*076a95f5SAlan Maguire TEST_BTF(str, enum bpf_cmd, BTF_F_NONAME|BTF_F_ZERO, 172*076a95f5SAlan Maguire "BPF_MAP_CREATE", 0); 173*076a95f5SAlan Maguire 174*076a95f5SAlan Maguire TEST_BTF(str, enum bpf_cmd, BTF_F_ZERO, "(enum bpf_cmd)BPF_MAP_CREATE", 175*076a95f5SAlan Maguire BPF_MAP_CREATE); 176*076a95f5SAlan Maguire TEST_BTF(str, enum bpf_cmd, BTF_F_NONAME|BTF_F_ZERO, 177*076a95f5SAlan Maguire "BPF_MAP_CREATE", BPF_MAP_CREATE); 178*076a95f5SAlan Maguire TEST_BTF_C(str, enum bpf_cmd, 0, 2000); 179*076a95f5SAlan Maguire TEST_BTF(str, enum bpf_cmd, BTF_F_NONAME, "2000", 2000); 180*076a95f5SAlan Maguire 181*076a95f5SAlan Maguire /* simple struct */ 182*076a95f5SAlan Maguire TEST_BTF_C(str, struct btf_enum, 0, 183*076a95f5SAlan Maguire {.name_off = (__u32)3,.val = (__s32)-1,}); 184*076a95f5SAlan Maguire TEST_BTF(str, struct btf_enum, BTF_F_NONAME, "{3,-1,}", 185*076a95f5SAlan Maguire { .name_off = 3, .val = -1,}); 186*076a95f5SAlan Maguire TEST_BTF(str, struct btf_enum, BTF_F_NONAME, "{-1,}", 187*076a95f5SAlan Maguire { .name_off = 0, .val = -1,}); 188*076a95f5SAlan Maguire TEST_BTF(str, struct btf_enum, BTF_F_NONAME|BTF_F_ZERO, "{0,-1,}", 189*076a95f5SAlan Maguire { .name_off = 0, .val = -1,}); 190*076a95f5SAlan Maguire /* empty struct should be printed */ 191*076a95f5SAlan Maguire TEST_BTF(str, struct btf_enum, 0, "(struct btf_enum){}", 192*076a95f5SAlan Maguire { .name_off = 0, .val = 0,}); 193*076a95f5SAlan Maguire TEST_BTF(str, struct btf_enum, BTF_F_NONAME, "{}", 194*076a95f5SAlan Maguire { .name_off = 0, .val = 0,}); 195*076a95f5SAlan Maguire TEST_BTF(str, struct btf_enum, BTF_F_ZERO, 196*076a95f5SAlan Maguire "(struct btf_enum){.name_off = (__u32)0,.val = (__s32)0,}", 197*076a95f5SAlan Maguire { .name_off = 0, .val = 0,}); 198*076a95f5SAlan Maguire 199*076a95f5SAlan Maguire /* struct with pointers */ 200*076a95f5SAlan Maguire TEST_BTF(str, struct list_head, BTF_F_PTR_RAW, 201*076a95f5SAlan Maguire "(struct list_head){.next = (struct list_head *)0x0000000000000001,}", 202*076a95f5SAlan Maguire { .next = (struct list_head *)1 }); 203*076a95f5SAlan Maguire /* NULL pointer should not be displayed */ 204*076a95f5SAlan Maguire TEST_BTF(str, struct list_head, BTF_F_PTR_RAW, 205*076a95f5SAlan Maguire "(struct list_head){}", 206*076a95f5SAlan Maguire { .next = (struct list_head *)0 }); 207*076a95f5SAlan Maguire 208*076a95f5SAlan Maguire /* struct with char array */ 209*076a95f5SAlan Maguire TEST_BTF(str, struct bpf_prog_info, 0, 210*076a95f5SAlan Maguire "(struct bpf_prog_info){.name = (char[])['f','o','o',],}", 211*076a95f5SAlan Maguire { .name = "foo",}); 212*076a95f5SAlan Maguire TEST_BTF(str, struct bpf_prog_info, BTF_F_NONAME, 213*076a95f5SAlan Maguire "{['f','o','o',],}", 214*076a95f5SAlan Maguire {.name = "foo",}); 215*076a95f5SAlan Maguire /* leading null char means do not display string */ 216*076a95f5SAlan Maguire TEST_BTF(str, struct bpf_prog_info, 0, 217*076a95f5SAlan Maguire "(struct bpf_prog_info){}", 218*076a95f5SAlan Maguire {.name = {'\0', 'f', 'o', 'o'}}); 219*076a95f5SAlan Maguire /* handle non-printable characters */ 220*076a95f5SAlan Maguire TEST_BTF(str, struct bpf_prog_info, 0, 221*076a95f5SAlan Maguire "(struct bpf_prog_info){.name = (char[])[1,2,3,],}", 222*076a95f5SAlan Maguire { .name = {1, 2, 3, 0}}); 223*076a95f5SAlan Maguire 224*076a95f5SAlan Maguire /* struct with non-char array */ 225*076a95f5SAlan Maguire TEST_BTF(str, struct __sk_buff, 0, 226*076a95f5SAlan Maguire "(struct __sk_buff){.cb = (__u32[])[1,2,3,4,5,],}", 227*076a95f5SAlan Maguire { .cb = {1, 2, 3, 4, 5,},}); 228*076a95f5SAlan Maguire TEST_BTF(str, struct __sk_buff, BTF_F_NONAME, 229*076a95f5SAlan Maguire "{[1,2,3,4,5,],}", 230*076a95f5SAlan Maguire { .cb = { 1, 2, 3, 4, 5},}); 231*076a95f5SAlan Maguire /* For non-char, arrays, show non-zero values only */ 232*076a95f5SAlan Maguire TEST_BTF(str, struct __sk_buff, 0, 233*076a95f5SAlan Maguire "(struct __sk_buff){.cb = (__u32[])[1,],}", 234*076a95f5SAlan Maguire { .cb = { 0, 0, 1, 0, 0},}); 235*076a95f5SAlan Maguire 236*076a95f5SAlan Maguire /* struct with bitfields */ 237*076a95f5SAlan Maguire TEST_BTF_C(str, struct bpf_insn, 0, 238*076a95f5SAlan Maguire {.code = (__u8)1,.dst_reg = (__u8)0x2,.src_reg = (__u8)0x3,.off = (__s16)4,.imm = (__s32)5,}); 239*076a95f5SAlan Maguire TEST_BTF(str, struct bpf_insn, BTF_F_NONAME, "{1,0x2,0x3,4,5,}", 240*076a95f5SAlan Maguire {.code = 1, .dst_reg = 0x2, .src_reg = 0x3, .off = 4, 241*076a95f5SAlan Maguire .imm = 5,}); 242*076a95f5SAlan Maguire #else 243*076a95f5SAlan Maguire skip = true; 244*076a95f5SAlan Maguire #endif 245*076a95f5SAlan Maguire 246*076a95f5SAlan Maguire return 0; 247*076a95f5SAlan Maguire } 248*076a95f5SAlan Maguire 249*076a95f5SAlan Maguire char _license[] SEC("license") = "GPL"; 250