1 /* SPDX-License-Identifier: GPL-2.0 */
2 /* Copyright (c) 2018 Facebook */
7 #include <linux/kernel.h>
8 #include <linux/filter.h>
9 #include <linux/unistd.h>
21 #include <bpf/libbpf.h>
25 #include "../test_btf.h"
26 #include "test_progs.h"
29 #define MAX_SUBPROGS 16
31 static int duration = 0;
32 static bool always_log;
35 #define CHECK(condition, format...) _CHECK(condition, "check", duration, format)
37 #define NAME_TBD 0xdeadb33f
39 #define NAME_NTH(N) (0xfffe0000 | N)
40 #define IS_NAME_NTH(X) ((X & 0xffff0000) == 0xfffe0000)
41 #define GET_NAME_NTH_IDX(X) (X & 0x0000ffff)
43 #define MAX_NR_RAW_U32 1024
44 #define BTF_LOG_BUF_SIZE 65535
46 static char btf_log_buf[BTF_LOG_BUF_SIZE];
48 static struct btf_header hdr_tmpl = {
50 .version = BTF_VERSION,
51 .hdr_len = sizeof(struct btf_header),
54 /* several different mapv kinds(types) supported by pprint */
55 enum pprint_mapv_kind_t {
56 PPRINT_MAPV_KIND_BASIC = 0,
57 PPRINT_MAPV_KIND_INT128,
65 __u32 raw_types[MAX_NR_RAW_U32];
67 enum bpf_map_type map_type;
82 enum pprint_mapv_kind_t mapv_kind;
85 #define BTF_STR_SEC(str) \
86 .str_sec = str, .str_sec_size = sizeof(str)
88 static struct btf_raw_test raw_tests[] = {
95 * unsigned long long m;
105 .descr = "struct test #1",
108 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
109 /* unsigned long long */
110 BTF_TYPE_INT_ENC(0, 0, 0, 64, 8), /* [2] */
112 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 8, 1), /* [3] */
114 BTF_TYPE_ARRAY_ENC(1, 1, 8), /* [4] */
115 /* struct A { */ /* [5] */
116 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 6), 180),
117 BTF_MEMBER_ENC(NAME_TBD, 2, 0), /* unsigned long long m;*/
118 BTF_MEMBER_ENC(NAME_TBD, 1, 64),/* int n; */
119 BTF_MEMBER_ENC(NAME_TBD, 3, 96),/* char o; */
120 BTF_MEMBER_ENC(NAME_TBD, 4, 128),/* int p[8] */
121 BTF_MEMBER_ENC(NAME_TBD, 6, 384),/* int q[4][8] */
122 BTF_MEMBER_ENC(NAME_TBD, 7, 1408), /* enum E r */
125 BTF_TYPE_ARRAY_ENC(4, 1, 4), /* [6] */
126 /* enum E */ /* [7] */
127 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_ENUM, 0, 2), sizeof(int)),
128 BTF_ENUM_ENC(NAME_TBD, 0),
129 BTF_ENUM_ENC(NAME_TBD, 1),
132 .str_sec = "\0A\0m\0n\0o\0p\0q\0r\0E\0E0\0E1",
133 .str_sec_size = sizeof("\0A\0m\0n\0o\0p\0q\0r\0E\0E0\0E1"),
134 .map_type = BPF_MAP_TYPE_ARRAY,
135 .map_name = "struct_test1_map",
136 .key_size = sizeof(int),
143 /* typedef struct b Struct_B;
148 * const Struct_B o[4];
157 .descr = "struct test #2",
160 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
161 /* struct b [4] */ /* [2] */
162 BTF_TYPE_ARRAY_ENC(4, 1, 4),
164 /* struct A { */ /* [3] */
165 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 3), 68),
166 BTF_MEMBER_ENC(NAME_TBD, 1, 0), /* int m; */
167 BTF_MEMBER_ENC(NAME_TBD, 2, 32),/* struct B n[4] */
168 BTF_MEMBER_ENC(NAME_TBD, 8, 288),/* const Struct_B o[4];*/
171 /* struct B { */ /* [4] */
172 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 2), 8),
173 BTF_MEMBER_ENC(NAME_TBD, 1, 0), /* int m; */
174 BTF_MEMBER_ENC(NAME_TBD, 1, 32),/* int n; */
177 /* const int */ /* [5] */
178 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 1),
179 /* typedef struct b Struct_B */ /* [6] */
180 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_TYPEDEF, 0, 0), 4),
181 /* const Struct_B */ /* [7] */
182 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 6),
183 /* const Struct_B [4] */ /* [8] */
184 BTF_TYPE_ARRAY_ENC(7, 1, 4),
187 .str_sec = "\0A\0m\0n\0o\0B\0m\0n\0Struct_B",
188 .str_sec_size = sizeof("\0A\0m\0n\0o\0B\0m\0n\0Struct_B"),
189 .map_type = BPF_MAP_TYPE_ARRAY,
190 .map_name = "struct_test2_map",
191 .key_size = sizeof(int),
198 .descr = "struct test #3 Invalid member offset",
201 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
202 /* int64 */ /* [2] */
203 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 64, 8),
205 /* struct A { */ /* [3] */
206 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 2), 16),
207 BTF_MEMBER_ENC(NAME_TBD, 1, 64), /* int m; */
208 BTF_MEMBER_ENC(NAME_TBD, 2, 0), /* int64 n; */
212 .str_sec = "\0A\0m\0n\0",
213 .str_sec_size = sizeof("\0A\0m\0n\0"),
214 .map_type = BPF_MAP_TYPE_ARRAY,
215 .map_name = "struct_test3_map",
216 .key_size = sizeof(int),
221 .btf_load_err = true,
222 .err_str = "Invalid member bits_offset",
226 * unsigned long long m;
234 .descr = "global data test #1",
237 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
238 /* unsigned long long */
239 BTF_TYPE_INT_ENC(0, 0, 0, 64, 8), /* [2] */
241 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 8, 1), /* [3] */
243 BTF_TYPE_ARRAY_ENC(1, 1, 8), /* [4] */
244 /* struct A { */ /* [5] */
245 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 4), 48),
246 BTF_MEMBER_ENC(NAME_TBD, 2, 0), /* unsigned long long m;*/
247 BTF_MEMBER_ENC(NAME_TBD, 1, 64),/* int n; */
248 BTF_MEMBER_ENC(NAME_TBD, 3, 96),/* char o; */
249 BTF_MEMBER_ENC(NAME_TBD, 4, 128),/* int p[8] */
253 .str_sec = "\0A\0m\0n\0o\0p",
254 .str_sec_size = sizeof("\0A\0m\0n\0o\0p"),
255 .map_type = BPF_MAP_TYPE_ARRAY,
256 .map_name = "struct_test1_map",
257 .key_size = sizeof(int),
265 * unsigned long long m;
271 * static struct A t; <- in .bss
274 .descr = "global data test #2",
277 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
278 /* unsigned long long */
279 BTF_TYPE_INT_ENC(0, 0, 0, 64, 8), /* [2] */
281 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 8, 1), /* [3] */
283 BTF_TYPE_ARRAY_ENC(1, 1, 8), /* [4] */
284 /* struct A { */ /* [5] */
285 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 4), 48),
286 BTF_MEMBER_ENC(NAME_TBD, 2, 0), /* unsigned long long m;*/
287 BTF_MEMBER_ENC(NAME_TBD, 1, 64),/* int n; */
288 BTF_MEMBER_ENC(NAME_TBD, 3, 96),/* char o; */
289 BTF_MEMBER_ENC(NAME_TBD, 4, 128),/* int p[8] */
291 /* static struct A t */
292 BTF_VAR_ENC(NAME_TBD, 5, 0), /* [6] */
293 /* .bss section */ /* [7] */
294 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 48),
295 BTF_VAR_SECINFO_ENC(6, 0, 48),
298 .str_sec = "\0A\0m\0n\0o\0p\0t\0.bss",
299 .str_sec_size = sizeof("\0A\0m\0n\0o\0p\0t\0.bss"),
300 .map_type = BPF_MAP_TYPE_ARRAY,
302 .key_size = sizeof(int),
309 .descr = "global data test #3",
312 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
314 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [2] */
315 /* .bss section */ /* [3] */
316 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
317 BTF_VAR_SECINFO_ENC(2, 0, 4),
320 .str_sec = "\0t\0.bss",
321 .str_sec_size = sizeof("\0t\0.bss"),
322 .map_type = BPF_MAP_TYPE_ARRAY,
324 .key_size = sizeof(int),
331 .descr = "global data test #4, unsupported linkage",
334 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
336 BTF_VAR_ENC(NAME_TBD, 1, 2), /* [2] */
337 /* .bss section */ /* [3] */
338 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
339 BTF_VAR_SECINFO_ENC(2, 0, 4),
342 .str_sec = "\0t\0.bss",
343 .str_sec_size = sizeof("\0t\0.bss"),
344 .map_type = BPF_MAP_TYPE_ARRAY,
346 .key_size = sizeof(int),
351 .btf_load_err = true,
352 .err_str = "Linkage not supported",
355 .descr = "global data test #5, invalid var type",
358 BTF_VAR_ENC(NAME_TBD, 0, 0), /* [1] */
359 /* .bss section */ /* [2] */
360 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
361 BTF_VAR_SECINFO_ENC(1, 0, 4),
364 .str_sec = "\0t\0.bss",
365 .str_sec_size = sizeof("\0t\0.bss"),
366 .map_type = BPF_MAP_TYPE_ARRAY,
368 .key_size = sizeof(int),
373 .btf_load_err = true,
374 .err_str = "Invalid type_id",
377 .descr = "global data test #6, invalid var type (fwd type)",
380 BTF_TYPE_ENC(NAME_TBD,
381 BTF_INFO_ENC(BTF_KIND_FWD, 1, 0), 0), /* [1] */
382 /* static union A t */
383 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [2] */
384 /* .bss section */ /* [3] */
385 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
386 BTF_VAR_SECINFO_ENC(2, 0, 4),
389 .str_sec = "\0A\0t\0.bss",
390 .str_sec_size = sizeof("\0A\0t\0.bss"),
391 .map_type = BPF_MAP_TYPE_ARRAY,
393 .key_size = sizeof(int),
398 .btf_load_err = true,
399 .err_str = "Invalid type",
402 .descr = "global data test #7, invalid var type (fwd type)",
405 BTF_TYPE_ENC(NAME_TBD,
406 BTF_INFO_ENC(BTF_KIND_FWD, 1, 0), 0), /* [1] */
407 /* static union A t */
408 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [2] */
409 /* .bss section */ /* [3] */
410 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
411 BTF_VAR_SECINFO_ENC(1, 0, 4),
414 .str_sec = "\0A\0t\0.bss",
415 .str_sec_size = sizeof("\0A\0t\0.bss"),
416 .map_type = BPF_MAP_TYPE_ARRAY,
418 .key_size = sizeof(int),
423 .btf_load_err = true,
424 .err_str = "Invalid type",
427 .descr = "global data test #8, invalid var size",
430 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
431 /* unsigned long long */
432 BTF_TYPE_INT_ENC(0, 0, 0, 64, 8), /* [2] */
434 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 8, 1), /* [3] */
436 BTF_TYPE_ARRAY_ENC(1, 1, 8), /* [4] */
437 /* struct A { */ /* [5] */
438 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 4), 48),
439 BTF_MEMBER_ENC(NAME_TBD, 2, 0), /* unsigned long long m;*/
440 BTF_MEMBER_ENC(NAME_TBD, 1, 64),/* int n; */
441 BTF_MEMBER_ENC(NAME_TBD, 3, 96),/* char o; */
442 BTF_MEMBER_ENC(NAME_TBD, 4, 128),/* int p[8] */
444 /* static struct A t */
445 BTF_VAR_ENC(NAME_TBD, 5, 0), /* [6] */
446 /* .bss section */ /* [7] */
447 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 48),
448 BTF_VAR_SECINFO_ENC(6, 0, 47),
451 .str_sec = "\0A\0m\0n\0o\0p\0t\0.bss",
452 .str_sec_size = sizeof("\0A\0m\0n\0o\0p\0t\0.bss"),
453 .map_type = BPF_MAP_TYPE_ARRAY,
455 .key_size = sizeof(int),
460 .btf_load_err = true,
461 .err_str = "Invalid size",
464 .descr = "global data test #9, invalid var size",
467 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
468 /* unsigned long long */
469 BTF_TYPE_INT_ENC(0, 0, 0, 64, 8), /* [2] */
471 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 8, 1), /* [3] */
473 BTF_TYPE_ARRAY_ENC(1, 1, 8), /* [4] */
474 /* struct A { */ /* [5] */
475 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 4), 48),
476 BTF_MEMBER_ENC(NAME_TBD, 2, 0), /* unsigned long long m;*/
477 BTF_MEMBER_ENC(NAME_TBD, 1, 64),/* int n; */
478 BTF_MEMBER_ENC(NAME_TBD, 3, 96),/* char o; */
479 BTF_MEMBER_ENC(NAME_TBD, 4, 128),/* int p[8] */
481 /* static struct A t */
482 BTF_VAR_ENC(NAME_TBD, 5, 0), /* [6] */
483 /* .bss section */ /* [7] */
484 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 46),
485 BTF_VAR_SECINFO_ENC(6, 0, 48),
488 .str_sec = "\0A\0m\0n\0o\0p\0t\0.bss",
489 .str_sec_size = sizeof("\0A\0m\0n\0o\0p\0t\0.bss"),
490 .map_type = BPF_MAP_TYPE_ARRAY,
492 .key_size = sizeof(int),
497 .btf_load_err = true,
498 .err_str = "Invalid size",
501 .descr = "global data test #10, invalid var size",
504 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
505 /* unsigned long long */
506 BTF_TYPE_INT_ENC(0, 0, 0, 64, 8), /* [2] */
508 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 8, 1), /* [3] */
510 BTF_TYPE_ARRAY_ENC(1, 1, 8), /* [4] */
511 /* struct A { */ /* [5] */
512 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 4), 48),
513 BTF_MEMBER_ENC(NAME_TBD, 2, 0), /* unsigned long long m;*/
514 BTF_MEMBER_ENC(NAME_TBD, 1, 64),/* int n; */
515 BTF_MEMBER_ENC(NAME_TBD, 3, 96),/* char o; */
516 BTF_MEMBER_ENC(NAME_TBD, 4, 128),/* int p[8] */
518 /* static struct A t */
519 BTF_VAR_ENC(NAME_TBD, 5, 0), /* [6] */
520 /* .bss section */ /* [7] */
521 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 46),
522 BTF_VAR_SECINFO_ENC(6, 0, 46),
525 .str_sec = "\0A\0m\0n\0o\0p\0t\0.bss",
526 .str_sec_size = sizeof("\0A\0m\0n\0o\0p\0t\0.bss"),
527 .map_type = BPF_MAP_TYPE_ARRAY,
529 .key_size = sizeof(int),
534 .btf_load_err = true,
535 .err_str = "Invalid size",
538 .descr = "global data test #11, multiple section members",
541 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
542 /* unsigned long long */
543 BTF_TYPE_INT_ENC(0, 0, 0, 64, 8), /* [2] */
545 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 8, 1), /* [3] */
547 BTF_TYPE_ARRAY_ENC(1, 1, 8), /* [4] */
548 /* struct A { */ /* [5] */
549 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 4), 48),
550 BTF_MEMBER_ENC(NAME_TBD, 2, 0), /* unsigned long long m;*/
551 BTF_MEMBER_ENC(NAME_TBD, 1, 64),/* int n; */
552 BTF_MEMBER_ENC(NAME_TBD, 3, 96),/* char o; */
553 BTF_MEMBER_ENC(NAME_TBD, 4, 128),/* int p[8] */
555 /* static struct A t */
556 BTF_VAR_ENC(NAME_TBD, 5, 0), /* [6] */
558 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [7] */
559 /* .bss section */ /* [8] */
560 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 2), 62),
561 BTF_VAR_SECINFO_ENC(6, 10, 48),
562 BTF_VAR_SECINFO_ENC(7, 58, 4),
565 .str_sec = "\0A\0m\0n\0o\0p\0t\0u\0.bss",
566 .str_sec_size = sizeof("\0A\0m\0n\0o\0p\0t\0u\0.bss"),
567 .map_type = BPF_MAP_TYPE_ARRAY,
569 .key_size = sizeof(int),
576 .descr = "global data test #12, invalid offset",
579 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
580 /* unsigned long long */
581 BTF_TYPE_INT_ENC(0, 0, 0, 64, 8), /* [2] */
583 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 8, 1), /* [3] */
585 BTF_TYPE_ARRAY_ENC(1, 1, 8), /* [4] */
586 /* struct A { */ /* [5] */
587 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 4), 48),
588 BTF_MEMBER_ENC(NAME_TBD, 2, 0), /* unsigned long long m;*/
589 BTF_MEMBER_ENC(NAME_TBD, 1, 64),/* int n; */
590 BTF_MEMBER_ENC(NAME_TBD, 3, 96),/* char o; */
591 BTF_MEMBER_ENC(NAME_TBD, 4, 128),/* int p[8] */
593 /* static struct A t */
594 BTF_VAR_ENC(NAME_TBD, 5, 0), /* [6] */
596 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [7] */
597 /* .bss section */ /* [8] */
598 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 2), 62),
599 BTF_VAR_SECINFO_ENC(6, 10, 48),
600 BTF_VAR_SECINFO_ENC(7, 60, 4),
603 .str_sec = "\0A\0m\0n\0o\0p\0t\0u\0.bss",
604 .str_sec_size = sizeof("\0A\0m\0n\0o\0p\0t\0u\0.bss"),
605 .map_type = BPF_MAP_TYPE_ARRAY,
607 .key_size = sizeof(int),
612 .btf_load_err = true,
613 .err_str = "Invalid offset+size",
616 .descr = "global data test #13, invalid offset",
619 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
620 /* unsigned long long */
621 BTF_TYPE_INT_ENC(0, 0, 0, 64, 8), /* [2] */
623 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 8, 1), /* [3] */
625 BTF_TYPE_ARRAY_ENC(1, 1, 8), /* [4] */
626 /* struct A { */ /* [5] */
627 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 4), 48),
628 BTF_MEMBER_ENC(NAME_TBD, 2, 0), /* unsigned long long m;*/
629 BTF_MEMBER_ENC(NAME_TBD, 1, 64),/* int n; */
630 BTF_MEMBER_ENC(NAME_TBD, 3, 96),/* char o; */
631 BTF_MEMBER_ENC(NAME_TBD, 4, 128),/* int p[8] */
633 /* static struct A t */
634 BTF_VAR_ENC(NAME_TBD, 5, 0), /* [6] */
636 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [7] */
637 /* .bss section */ /* [8] */
638 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 2), 62),
639 BTF_VAR_SECINFO_ENC(6, 10, 48),
640 BTF_VAR_SECINFO_ENC(7, 12, 4),
643 .str_sec = "\0A\0m\0n\0o\0p\0t\0u\0.bss",
644 .str_sec_size = sizeof("\0A\0m\0n\0o\0p\0t\0u\0.bss"),
645 .map_type = BPF_MAP_TYPE_ARRAY,
647 .key_size = sizeof(int),
652 .btf_load_err = true,
653 .err_str = "Invalid offset",
656 .descr = "global data test #14, invalid offset",
659 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
660 /* unsigned long long */
661 BTF_TYPE_INT_ENC(0, 0, 0, 64, 8), /* [2] */
663 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 8, 1), /* [3] */
665 BTF_TYPE_ARRAY_ENC(1, 1, 8), /* [4] */
666 /* struct A { */ /* [5] */
667 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 4), 48),
668 BTF_MEMBER_ENC(NAME_TBD, 2, 0), /* unsigned long long m;*/
669 BTF_MEMBER_ENC(NAME_TBD, 1, 64),/* int n; */
670 BTF_MEMBER_ENC(NAME_TBD, 3, 96),/* char o; */
671 BTF_MEMBER_ENC(NAME_TBD, 4, 128),/* int p[8] */
673 /* static struct A t */
674 BTF_VAR_ENC(NAME_TBD, 5, 0), /* [6] */
676 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [7] */
677 /* .bss section */ /* [8] */
678 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 2), 62),
679 BTF_VAR_SECINFO_ENC(7, 58, 4),
680 BTF_VAR_SECINFO_ENC(6, 10, 48),
683 .str_sec = "\0A\0m\0n\0o\0p\0t\0u\0.bss",
684 .str_sec_size = sizeof("\0A\0m\0n\0o\0p\0t\0u\0.bss"),
685 .map_type = BPF_MAP_TYPE_ARRAY,
687 .key_size = sizeof(int),
692 .btf_load_err = true,
693 .err_str = "Invalid offset",
696 .descr = "global data test #15, not var kind",
699 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
700 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [2] */
701 /* .bss section */ /* [3] */
702 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
703 BTF_VAR_SECINFO_ENC(1, 0, 4),
706 .str_sec = "\0A\0t\0.bss",
707 .str_sec_size = sizeof("\0A\0t\0.bss"),
708 .map_type = BPF_MAP_TYPE_ARRAY,
710 .key_size = sizeof(int),
715 .btf_load_err = true,
716 .err_str = "Not a VAR kind member",
719 .descr = "global data test #16, invalid var referencing sec",
722 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
723 BTF_VAR_ENC(NAME_TBD, 5, 0), /* [2] */
724 BTF_VAR_ENC(NAME_TBD, 2, 0), /* [3] */
725 /* a section */ /* [4] */
726 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
727 BTF_VAR_SECINFO_ENC(3, 0, 4),
728 /* a section */ /* [5] */
729 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
730 BTF_VAR_SECINFO_ENC(6, 0, 4),
731 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [6] */
734 .str_sec = "\0A\0t\0s\0a\0a",
735 .str_sec_size = sizeof("\0A\0t\0s\0a\0a"),
736 .map_type = BPF_MAP_TYPE_ARRAY,
738 .key_size = sizeof(int),
743 .btf_load_err = true,
744 .err_str = "Invalid type_id",
747 .descr = "global data test #17, invalid var referencing var",
750 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
751 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [2] */
752 BTF_VAR_ENC(NAME_TBD, 2, 0), /* [3] */
753 /* a section */ /* [4] */
754 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
755 BTF_VAR_SECINFO_ENC(3, 0, 4),
758 .str_sec = "\0A\0t\0s\0a\0a",
759 .str_sec_size = sizeof("\0A\0t\0s\0a\0a"),
760 .map_type = BPF_MAP_TYPE_ARRAY,
762 .key_size = sizeof(int),
767 .btf_load_err = true,
768 .err_str = "Invalid type_id",
771 .descr = "global data test #18, invalid var loop",
774 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
775 BTF_VAR_ENC(NAME_TBD, 2, 0), /* [2] */
776 /* .bss section */ /* [3] */
777 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
778 BTF_VAR_SECINFO_ENC(2, 0, 4),
781 .str_sec = "\0A\0t\0aaa",
782 .str_sec_size = sizeof("\0A\0t\0aaa"),
783 .map_type = BPF_MAP_TYPE_ARRAY,
785 .key_size = sizeof(int),
790 .btf_load_err = true,
791 .err_str = "Invalid type_id",
794 .descr = "global data test #19, invalid var referencing var",
797 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
798 BTF_VAR_ENC(NAME_TBD, 3, 0), /* [2] */
799 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [3] */
802 .str_sec = "\0A\0t\0s\0a\0a",
803 .str_sec_size = sizeof("\0A\0t\0s\0a\0a"),
804 .map_type = BPF_MAP_TYPE_ARRAY,
806 .key_size = sizeof(int),
811 .btf_load_err = true,
812 .err_str = "Invalid type_id",
815 .descr = "global data test #20, invalid ptr referencing var",
818 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
819 /* PTR type_id=3 */ /* [2] */
820 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_PTR, 0, 0), 3),
821 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [3] */
824 .str_sec = "\0A\0t\0s\0a\0a",
825 .str_sec_size = sizeof("\0A\0t\0s\0a\0a"),
826 .map_type = BPF_MAP_TYPE_ARRAY,
828 .key_size = sizeof(int),
833 .btf_load_err = true,
834 .err_str = "Invalid type_id",
837 .descr = "global data test #21, var included in struct",
840 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
841 /* struct A { */ /* [2] */
842 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 2), sizeof(int) * 2),
843 BTF_MEMBER_ENC(NAME_TBD, 1, 0), /* int m; */
844 BTF_MEMBER_ENC(NAME_TBD, 3, 32),/* VAR type_id=3; */
846 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [3] */
849 .str_sec = "\0A\0t\0s\0a\0a",
850 .str_sec_size = sizeof("\0A\0t\0s\0a\0a"),
851 .map_type = BPF_MAP_TYPE_ARRAY,
853 .key_size = sizeof(int),
858 .btf_load_err = true,
859 .err_str = "Invalid member",
862 .descr = "global data test #22, array of var",
865 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
866 BTF_TYPE_ARRAY_ENC(3, 1, 4), /* [2] */
867 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [3] */
870 .str_sec = "\0A\0t\0s\0a\0a",
871 .str_sec_size = sizeof("\0A\0t\0s\0a\0a"),
872 .map_type = BPF_MAP_TYPE_ARRAY,
874 .key_size = sizeof(int),
879 .btf_load_err = true,
880 .err_str = "Invalid elem",
883 .descr = "var after datasec, ptr followed by modifier",
885 /* .bss section */ /* [1] */
886 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 2),
888 BTF_VAR_SECINFO_ENC(4, 0, sizeof(void*)),
889 BTF_VAR_SECINFO_ENC(6, sizeof(void*), 4),
891 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
893 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_PTR, 0, 0), 2),
894 BTF_VAR_ENC(NAME_TBD, 3, 0), /* [4] */
895 /* const int */ /* [5] */
896 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 2),
897 BTF_VAR_ENC(NAME_TBD, 5, 0), /* [6] */
900 .str_sec = "\0a\0b\0c\0",
901 .str_sec_size = sizeof("\0a\0b\0c\0"),
902 .map_type = BPF_MAP_TYPE_ARRAY,
904 .key_size = sizeof(int),
905 .value_size = sizeof(void*)+4,
910 /* Test member exceeds the size of struct.
918 .descr = "size check test #1",
921 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
922 /* struct A { */ /* [2] */
923 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 2), sizeof(int) * 2 - 1),
924 BTF_MEMBER_ENC(NAME_TBD, 1, 0), /* int m; */
925 BTF_MEMBER_ENC(NAME_TBD, 1, 32),/* int n; */
929 .str_sec = "\0A\0m\0n",
930 .str_sec_size = sizeof("\0A\0m\0n"),
931 .map_type = BPF_MAP_TYPE_ARRAY,
932 .map_name = "size_check1_map",
933 .key_size = sizeof(int),
938 .btf_load_err = true,
939 .err_str = "Member exceeds struct_size",
942 /* Test member exceeds the size of struct
950 .descr = "size check test #2",
953 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, sizeof(int)),
954 /* int[2] */ /* [2] */
955 BTF_TYPE_ARRAY_ENC(1, 1, 2),
956 /* struct A { */ /* [3] */
957 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 2), sizeof(int) * 3 - 1),
958 BTF_MEMBER_ENC(NAME_TBD, 1, 0), /* int m; */
959 BTF_MEMBER_ENC(NAME_TBD, 2, 32),/* int n[2]; */
963 .str_sec = "\0A\0m\0n",
964 .str_sec_size = sizeof("\0A\0m\0n"),
965 .map_type = BPF_MAP_TYPE_ARRAY,
966 .map_name = "size_check2_map",
967 .key_size = sizeof(int),
972 .btf_load_err = true,
973 .err_str = "Member exceeds struct_size",
976 /* Test member exceeds the size of struct
984 .descr = "size check test #3",
987 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, sizeof(int)),
988 /* void* */ /* [2] */
989 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_PTR, 0, 0), 0),
990 /* struct A { */ /* [3] */
991 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 2), sizeof(int) + sizeof(void *) - 1),
992 BTF_MEMBER_ENC(NAME_TBD, 1, 0), /* int m; */
993 BTF_MEMBER_ENC(NAME_TBD, 2, 32),/* void *n; */
997 .str_sec = "\0A\0m\0n",
998 .str_sec_size = sizeof("\0A\0m\0n"),
999 .map_type = BPF_MAP_TYPE_ARRAY,
1000 .map_name = "size_check3_map",
1001 .key_size = sizeof(int),
1006 .btf_load_err = true,
1007 .err_str = "Member exceeds struct_size",
1010 /* Test member exceeds the size of struct
1023 .descr = "size check test #4",
1026 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, sizeof(int)),
1027 /* enum E { */ /* [2] */
1028 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_ENUM, 0, 2), sizeof(int)),
1029 BTF_ENUM_ENC(NAME_TBD, 0),
1030 BTF_ENUM_ENC(NAME_TBD, 1),
1032 /* struct A { */ /* [3] */
1033 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 2), sizeof(int) * 2 - 1),
1034 BTF_MEMBER_ENC(NAME_TBD, 1, 0), /* int m; */
1035 BTF_MEMBER_ENC(NAME_TBD, 2, 32),/* enum E n; */
1039 .str_sec = "\0E\0E0\0E1\0A\0m\0n",
1040 .str_sec_size = sizeof("\0E\0E0\0E1\0A\0m\0n"),
1041 .map_type = BPF_MAP_TYPE_ARRAY,
1042 .map_name = "size_check4_map",
1043 .key_size = sizeof(int),
1048 .btf_load_err = true,
1049 .err_str = "Member exceeds struct_size",
1052 /* Test member unexceeds the size of struct
1061 * enum E __attribute__((packed)) n;
1065 .descr = "size check test #5",
1068 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, sizeof(int)),
1069 /* char */ /* [2] */
1070 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 8, 1),
1071 /* enum E { */ /* [3] */
1072 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_ENUM, 0, 2), 1),
1073 BTF_ENUM_ENC(NAME_TBD, 0),
1074 BTF_ENUM_ENC(NAME_TBD, 1),
1076 /* struct A { */ /* [4] */
1077 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 2), 2),
1078 BTF_MEMBER_ENC(NAME_TBD, 2, 0), /* char m; */
1079 BTF_MEMBER_ENC(NAME_TBD, 3, 8),/* enum E __attribute__((packed)) n; */
1083 .str_sec = "\0E\0E0\0E1\0A\0m\0n",
1084 .str_sec_size = sizeof("\0E\0E0\0E1\0A\0m\0n"),
1085 .map_type = BPF_MAP_TYPE_ARRAY,
1086 .map_name = "size_check5_map",
1087 .key_size = sizeof(int),
1094 /* typedef const void * const_void_ptr;
1100 .descr = "void test #1",
1103 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1104 /* const void */ /* [2] */
1105 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 0),
1106 /* const void* */ /* [3] */
1107 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_PTR, 0, 0), 2),
1108 /* typedef const void * const_void_ptr */
1109 BTF_TYPEDEF_ENC(NAME_TBD, 3), /* [4] */
1110 /* struct A { */ /* [5] */
1111 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 1), sizeof(void *)),
1112 /* const_void_ptr m; */
1113 BTF_MEMBER_ENC(NAME_TBD, 4, 0),
1117 .str_sec = "\0const_void_ptr\0A\0m",
1118 .str_sec_size = sizeof("\0const_void_ptr\0A\0m"),
1119 .map_type = BPF_MAP_TYPE_ARRAY,
1120 .map_name = "void_test1_map",
1121 .key_size = sizeof(int),
1122 .value_size = sizeof(void *),
1133 .descr = "void test #2",
1136 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1137 /* const void */ /* [2] */
1138 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 0),
1139 /* struct A { */ /* [3] */
1140 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 1), 8),
1142 BTF_MEMBER_ENC(NAME_TBD, 2, 0),
1146 .str_sec = "\0A\0m",
1147 .str_sec_size = sizeof("\0A\0m"),
1148 .map_type = BPF_MAP_TYPE_ARRAY,
1149 .map_name = "void_test2_map",
1150 .key_size = sizeof(int),
1151 .value_size = sizeof(void *),
1155 .btf_load_err = true,
1156 .err_str = "Invalid member",
1159 /* typedef const void * const_void_ptr;
1163 .descr = "void test #3",
1166 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1167 /* const void */ /* [2] */
1168 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 0),
1169 /* const void* */ /* [3] */
1170 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_PTR, 0, 0), 2),
1171 /* typedef const void * const_void_ptr */
1172 BTF_TYPEDEF_ENC(NAME_TBD, 3), /* [4] */
1173 /* const_void_ptr[4] */
1174 BTF_TYPE_ARRAY_ENC(4, 1, 4), /* [5] */
1177 .str_sec = "\0const_void_ptr",
1178 .str_sec_size = sizeof("\0const_void_ptr"),
1179 .map_type = BPF_MAP_TYPE_ARRAY,
1180 .map_name = "void_test3_map",
1181 .key_size = sizeof(int),
1182 .value_size = sizeof(void *) * 4,
1190 .descr = "void test #4",
1193 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1194 /* const void */ /* [2] */
1195 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 0),
1196 /* const void[4] */ /* [3] */
1197 BTF_TYPE_ARRAY_ENC(2, 1, 4),
1200 .str_sec = "\0A\0m",
1201 .str_sec_size = sizeof("\0A\0m"),
1202 .map_type = BPF_MAP_TYPE_ARRAY,
1203 .map_name = "void_test4_map",
1204 .key_size = sizeof(int),
1205 .value_size = sizeof(void *) * 4,
1209 .btf_load_err = true,
1210 .err_str = "Invalid elem",
1213 /* Array_A <------------------+
1214 * elem_type == Array_B |
1217 * Array_B <-------- + |
1218 * elem_type == Array A --+
1221 .descr = "loop test #1",
1224 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1225 /* Array_A */ /* [2] */
1226 BTF_TYPE_ARRAY_ENC(3, 1, 8),
1227 /* Array_B */ /* [3] */
1228 BTF_TYPE_ARRAY_ENC(2, 1, 8),
1232 .str_sec_size = sizeof(""),
1233 .map_type = BPF_MAP_TYPE_ARRAY,
1234 .map_name = "loop_test1_map",
1235 .key_size = sizeof(int),
1236 .value_size = sizeof(sizeof(int) * 8),
1240 .btf_load_err = true,
1241 .err_str = "Loop detected",
1244 /* typedef is _before_ the BTF type of Array_A and Array_B
1246 * typedef Array_B int_array;
1248 * Array_A <------------------+
1249 * elem_type == int_array |
1252 * Array_B <-------- + |
1253 * elem_type == Array_A --+
1256 .descr = "loop test #2",
1259 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
1260 /* typedef Array_B int_array */
1261 BTF_TYPEDEF_ENC(1, 4), /* [2] */
1263 BTF_TYPE_ARRAY_ENC(2, 1, 8), /* [3] */
1265 BTF_TYPE_ARRAY_ENC(3, 1, 8), /* [4] */
1268 .str_sec = "\0int_array\0",
1269 .str_sec_size = sizeof("\0int_array"),
1270 .map_type = BPF_MAP_TYPE_ARRAY,
1271 .map_name = "loop_test2_map",
1272 .key_size = sizeof(int),
1273 .value_size = sizeof(sizeof(int) * 8),
1277 .btf_load_err = true,
1278 .err_str = "Loop detected",
1281 /* Array_A <------------------+
1282 * elem_type == Array_B |
1285 * Array_B <-------- + |
1286 * elem_type == Array_A --+
1289 .descr = "loop test #3",
1292 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1293 /* Array_A */ /* [2] */
1294 BTF_TYPE_ARRAY_ENC(3, 1, 8),
1295 /* Array_B */ /* [3] */
1296 BTF_TYPE_ARRAY_ENC(2, 1, 8),
1300 .str_sec_size = sizeof(""),
1301 .map_type = BPF_MAP_TYPE_ARRAY,
1302 .map_name = "loop_test3_map",
1303 .key_size = sizeof(int),
1304 .value_size = sizeof(sizeof(int) * 8),
1308 .btf_load_err = true,
1309 .err_str = "Loop detected",
1312 /* typedef is _between_ the BTF type of Array_A and Array_B
1314 * typedef Array_B int_array;
1316 * Array_A <------------------+
1317 * elem_type == int_array |
1320 * Array_B <-------- + |
1321 * elem_type == Array_A --+
1324 .descr = "loop test #4",
1327 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1328 /* Array_A */ /* [2] */
1329 BTF_TYPE_ARRAY_ENC(3, 1, 8),
1330 /* typedef Array_B int_array */ /* [3] */
1331 BTF_TYPEDEF_ENC(NAME_TBD, 4),
1332 /* Array_B */ /* [4] */
1333 BTF_TYPE_ARRAY_ENC(2, 1, 8),
1336 .str_sec = "\0int_array\0",
1337 .str_sec_size = sizeof("\0int_array"),
1338 .map_type = BPF_MAP_TYPE_ARRAY,
1339 .map_name = "loop_test4_map",
1340 .key_size = sizeof(int),
1341 .value_size = sizeof(sizeof(int) * 8),
1345 .btf_load_err = true,
1346 .err_str = "Loop detected",
1349 /* typedef struct B Struct_B
1362 .descr = "loop test #5",
1365 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
1366 /* struct A */ /* [2] */
1367 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 2), 8),
1368 BTF_MEMBER_ENC(NAME_TBD, 1, 0), /* int x; */
1369 BTF_MEMBER_ENC(NAME_TBD, 3, 32),/* Struct_B y; */
1370 /* typedef struct B Struct_B */
1371 BTF_TYPEDEF_ENC(NAME_TBD, 4), /* [3] */
1372 /* struct B */ /* [4] */
1373 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 2), 8),
1374 BTF_MEMBER_ENC(NAME_TBD, 1, 0), /* int x; */
1375 BTF_MEMBER_ENC(NAME_TBD, 2, 32),/* struct A y; */
1378 .str_sec = "\0A\0x\0y\0Struct_B\0B\0x\0y",
1379 .str_sec_size = sizeof("\0A\0x\0y\0Struct_B\0B\0x\0y"),
1380 .map_type = BPF_MAP_TYPE_ARRAY,
1381 .map_name = "loop_test5_map",
1382 .key_size = sizeof(int),
1387 .btf_load_err = true,
1388 .err_str = "Loop detected",
1393 * struct A array_a[4];
1397 .descr = "loop test #6",
1400 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
1401 BTF_TYPE_ARRAY_ENC(3, 1, 4), /* [2] */
1402 /* struct A */ /* [3] */
1403 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 2), 8),
1404 BTF_MEMBER_ENC(NAME_TBD, 1, 0), /* int x; */
1405 BTF_MEMBER_ENC(NAME_TBD, 2, 32),/* struct A array_a[4]; */
1408 .str_sec = "\0A\0x\0y",
1409 .str_sec_size = sizeof("\0A\0x\0y"),
1410 .map_type = BPF_MAP_TYPE_ARRAY,
1411 .map_name = "loop_test6_map",
1412 .key_size = sizeof(int),
1417 .btf_load_err = true,
1418 .err_str = "Loop detected",
1422 .descr = "loop test #7",
1425 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1426 /* struct A { */ /* [2] */
1427 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 1), sizeof(void *)),
1428 /* const void *m; */
1429 BTF_MEMBER_ENC(NAME_TBD, 3, 0),
1430 /* CONST type_id=3 */ /* [3] */
1431 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 4),
1432 /* PTR type_id=2 */ /* [4] */
1433 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_PTR, 0, 0), 3),
1436 .str_sec = "\0A\0m",
1437 .str_sec_size = sizeof("\0A\0m"),
1438 .map_type = BPF_MAP_TYPE_ARRAY,
1439 .map_name = "loop_test7_map",
1440 .key_size = sizeof(int),
1441 .value_size = sizeof(void *),
1445 .btf_load_err = true,
1446 .err_str = "Loop detected",
1450 .descr = "loop test #8",
1453 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1454 /* struct A { */ /* [2] */
1455 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 1), sizeof(void *)),
1456 /* const void *m; */
1457 BTF_MEMBER_ENC(NAME_TBD, 4, 0),
1458 /* struct B { */ /* [3] */
1459 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 1), sizeof(void *)),
1460 /* const void *n; */
1461 BTF_MEMBER_ENC(NAME_TBD, 6, 0),
1462 /* CONST type_id=5 */ /* [4] */
1463 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 5),
1464 /* PTR type_id=6 */ /* [5] */
1465 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_PTR, 0, 0), 6),
1466 /* CONST type_id=7 */ /* [6] */
1467 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 7),
1468 /* PTR type_id=4 */ /* [7] */
1469 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_PTR, 0, 0), 4),
1472 .str_sec = "\0A\0m\0B\0n",
1473 .str_sec_size = sizeof("\0A\0m\0B\0n"),
1474 .map_type = BPF_MAP_TYPE_ARRAY,
1475 .map_name = "loop_test8_map",
1476 .key_size = sizeof(int),
1477 .value_size = sizeof(void *),
1481 .btf_load_err = true,
1482 .err_str = "Loop detected",
1486 .descr = "string section does not end with null",
1489 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
1493 .str_sec_size = sizeof("\0int") - 1,
1494 .map_type = BPF_MAP_TYPE_ARRAY,
1495 .map_name = "hdr_test_map",
1496 .key_size = sizeof(int),
1497 .value_size = sizeof(int),
1501 .btf_load_err = true,
1502 .err_str = "Invalid string section",
1506 .descr = "empty string section",
1509 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1514 .map_type = BPF_MAP_TYPE_ARRAY,
1515 .map_name = "hdr_test_map",
1516 .key_size = sizeof(int),
1517 .value_size = sizeof(int),
1521 .btf_load_err = true,
1522 .err_str = "Invalid string section",
1526 .descr = "empty type section",
1531 .str_sec_size = sizeof("\0int"),
1532 .map_type = BPF_MAP_TYPE_ARRAY,
1533 .map_name = "hdr_test_map",
1534 .key_size = sizeof(int),
1535 .value_size = sizeof(int),
1539 .btf_load_err = true,
1540 .err_str = "No type found",
1544 .descr = "btf_header test. Longer hdr_len",
1547 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
1551 .str_sec_size = sizeof("\0int"),
1552 .map_type = BPF_MAP_TYPE_ARRAY,
1553 .map_name = "hdr_test_map",
1554 .key_size = sizeof(int),
1555 .value_size = sizeof(int),
1559 .btf_load_err = true,
1561 .err_str = "Unsupported btf_header",
1565 .descr = "btf_header test. Gap between hdr and type",
1568 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
1572 .str_sec_size = sizeof("\0int"),
1573 .map_type = BPF_MAP_TYPE_ARRAY,
1574 .map_name = "hdr_test_map",
1575 .key_size = sizeof(int),
1576 .value_size = sizeof(int),
1580 .btf_load_err = true,
1581 .type_off_delta = 4,
1582 .err_str = "Unsupported section found",
1586 .descr = "btf_header test. Gap between type and str",
1589 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
1593 .str_sec_size = sizeof("\0int"),
1594 .map_type = BPF_MAP_TYPE_ARRAY,
1595 .map_name = "hdr_test_map",
1596 .key_size = sizeof(int),
1597 .value_size = sizeof(int),
1601 .btf_load_err = true,
1603 .err_str = "Unsupported section found",
1607 .descr = "btf_header test. Overlap between type and str",
1610 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
1614 .str_sec_size = sizeof("\0int"),
1615 .map_type = BPF_MAP_TYPE_ARRAY,
1616 .map_name = "hdr_test_map",
1617 .key_size = sizeof(int),
1618 .value_size = sizeof(int),
1622 .btf_load_err = true,
1623 .str_off_delta = -4,
1624 .err_str = "Section overlap found",
1628 .descr = "btf_header test. Larger BTF size",
1631 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
1635 .str_sec_size = sizeof("\0int"),
1636 .map_type = BPF_MAP_TYPE_ARRAY,
1637 .map_name = "hdr_test_map",
1638 .key_size = sizeof(int),
1639 .value_size = sizeof(int),
1643 .btf_load_err = true,
1644 .str_len_delta = -4,
1645 .err_str = "Unsupported section found",
1649 .descr = "btf_header test. Smaller BTF size",
1652 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
1656 .str_sec_size = sizeof("\0int"),
1657 .map_type = BPF_MAP_TYPE_ARRAY,
1658 .map_name = "hdr_test_map",
1659 .key_size = sizeof(int),
1660 .value_size = sizeof(int),
1664 .btf_load_err = true,
1666 .err_str = "Total section length too long",
1670 .descr = "array test. index_type/elem_type \"int\"",
1673 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1674 /* int[16] */ /* [2] */
1675 BTF_TYPE_ARRAY_ENC(1, 1, 16),
1679 .str_sec_size = sizeof(""),
1680 .map_type = BPF_MAP_TYPE_ARRAY,
1681 .map_name = "array_test_map",
1682 .key_size = sizeof(int),
1683 .value_size = sizeof(int),
1690 .descr = "array test. index_type/elem_type \"const int\"",
1693 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1694 /* int[16] */ /* [2] */
1695 BTF_TYPE_ARRAY_ENC(3, 3, 16),
1696 /* CONST type_id=1 */ /* [3] */
1697 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 1),
1701 .str_sec_size = sizeof(""),
1702 .map_type = BPF_MAP_TYPE_ARRAY,
1703 .map_name = "array_test_map",
1704 .key_size = sizeof(int),
1705 .value_size = sizeof(int),
1712 .descr = "array test. index_type \"const int:31\"",
1715 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1716 /* int:31 */ /* [2] */
1717 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 31, 4),
1718 /* int[16] */ /* [3] */
1719 BTF_TYPE_ARRAY_ENC(1, 4, 16),
1720 /* CONST type_id=2 */ /* [4] */
1721 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 2),
1725 .str_sec_size = sizeof(""),
1726 .map_type = BPF_MAP_TYPE_ARRAY,
1727 .map_name = "array_test_map",
1728 .key_size = sizeof(int),
1729 .value_size = sizeof(int),
1733 .btf_load_err = true,
1734 .err_str = "Invalid index",
1738 .descr = "array test. elem_type \"const int:31\"",
1741 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1742 /* int:31 */ /* [2] */
1743 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 31, 4),
1744 /* int[16] */ /* [3] */
1745 BTF_TYPE_ARRAY_ENC(4, 1, 16),
1746 /* CONST type_id=2 */ /* [4] */
1747 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 2),
1751 .str_sec_size = sizeof(""),
1752 .map_type = BPF_MAP_TYPE_ARRAY,
1753 .map_name = "array_test_map",
1754 .key_size = sizeof(int),
1755 .value_size = sizeof(int),
1759 .btf_load_err = true,
1760 .err_str = "Invalid array of int",
1764 .descr = "array test. index_type \"void\"",
1767 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1768 /* int[16] */ /* [2] */
1769 BTF_TYPE_ARRAY_ENC(1, 0, 16),
1773 .str_sec_size = sizeof(""),
1774 .map_type = BPF_MAP_TYPE_ARRAY,
1775 .map_name = "array_test_map",
1776 .key_size = sizeof(int),
1777 .value_size = sizeof(int),
1781 .btf_load_err = true,
1782 .err_str = "Invalid index",
1786 .descr = "array test. index_type \"const void\"",
1789 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1790 /* int[16] */ /* [2] */
1791 BTF_TYPE_ARRAY_ENC(1, 3, 16),
1792 /* CONST type_id=0 (void) */ /* [3] */
1793 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 0),
1797 .str_sec_size = sizeof(""),
1798 .map_type = BPF_MAP_TYPE_ARRAY,
1799 .map_name = "array_test_map",
1800 .key_size = sizeof(int),
1801 .value_size = sizeof(int),
1805 .btf_load_err = true,
1806 .err_str = "Invalid index",
1810 .descr = "array test. elem_type \"const void\"",
1813 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1814 /* int[16] */ /* [2] */
1815 BTF_TYPE_ARRAY_ENC(3, 1, 16),
1816 /* CONST type_id=0 (void) */ /* [3] */
1817 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 0),
1821 .str_sec_size = sizeof(""),
1822 .map_type = BPF_MAP_TYPE_ARRAY,
1823 .map_name = "array_test_map",
1824 .key_size = sizeof(int),
1825 .value_size = sizeof(int),
1829 .btf_load_err = true,
1830 .err_str = "Invalid elem",
1834 .descr = "array test. elem_type \"const void *\"",
1837 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1838 /* const void *[16] */ /* [2] */
1839 BTF_TYPE_ARRAY_ENC(3, 1, 16),
1840 /* CONST type_id=4 */ /* [3] */
1841 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 4),
1842 /* void* */ /* [4] */
1843 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_PTR, 0, 0), 0),
1847 .str_sec_size = sizeof(""),
1848 .map_type = BPF_MAP_TYPE_ARRAY,
1849 .map_name = "array_test_map",
1850 .key_size = sizeof(int),
1851 .value_size = sizeof(int),
1858 .descr = "array test. index_type \"const void *\"",
1861 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1862 /* const void *[16] */ /* [2] */
1863 BTF_TYPE_ARRAY_ENC(3, 3, 16),
1864 /* CONST type_id=4 */ /* [3] */
1865 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 4),
1866 /* void* */ /* [4] */
1867 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_PTR, 0, 0), 0),
1871 .str_sec_size = sizeof(""),
1872 .map_type = BPF_MAP_TYPE_ARRAY,
1873 .map_name = "array_test_map",
1874 .key_size = sizeof(int),
1875 .value_size = sizeof(int),
1879 .btf_load_err = true,
1880 .err_str = "Invalid index",
1884 .descr = "array test. t->size != 0\"",
1887 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1888 /* int[16] */ /* [2] */
1889 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_ARRAY, 0, 0), 1),
1890 BTF_ARRAY_ENC(1, 1, 16),
1894 .str_sec_size = sizeof(""),
1895 .map_type = BPF_MAP_TYPE_ARRAY,
1896 .map_name = "array_test_map",
1897 .key_size = sizeof(int),
1898 .value_size = sizeof(int),
1902 .btf_load_err = true,
1903 .err_str = "size != 0",
1907 .descr = "int test. invalid int_data",
1909 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_INT, 0, 0), 4),
1914 .str_sec_size = sizeof(""),
1915 .map_type = BPF_MAP_TYPE_ARRAY,
1916 .map_name = "array_test_map",
1917 .key_size = sizeof(int),
1918 .value_size = sizeof(int),
1922 .btf_load_err = true,
1923 .err_str = "Invalid int_data",
1927 .descr = "invalid BTF_INFO",
1930 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1931 BTF_TYPE_ENC(0, 0x20000000, 4),
1935 .str_sec_size = sizeof(""),
1936 .map_type = BPF_MAP_TYPE_ARRAY,
1937 .map_name = "array_test_map",
1938 .key_size = sizeof(int),
1939 .value_size = sizeof(int),
1943 .btf_load_err = true,
1944 .err_str = "Invalid btf_info",
1948 .descr = "fwd test. t->type != 0\"",
1951 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
1952 /* fwd type */ /* [2] */
1953 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_FWD, 0, 0), 1),
1957 .str_sec_size = sizeof(""),
1958 .map_type = BPF_MAP_TYPE_ARRAY,
1959 .map_name = "fwd_test_map",
1960 .key_size = sizeof(int),
1961 .value_size = sizeof(int),
1965 .btf_load_err = true,
1966 .err_str = "type != 0",
1970 .descr = "typedef (invalid name, name_off = 0)",
1972 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
1973 BTF_TYPEDEF_ENC(0, 1), /* [2] */
1976 .str_sec = "\0__int",
1977 .str_sec_size = sizeof("\0__int"),
1978 .map_type = BPF_MAP_TYPE_ARRAY,
1979 .map_name = "typedef_check_btf",
1980 .key_size = sizeof(int),
1981 .value_size = sizeof(int),
1985 .btf_load_err = true,
1986 .err_str = "Invalid name",
1990 .descr = "typedef (invalid name, invalid identifier)",
1992 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
1993 BTF_TYPEDEF_ENC(NAME_TBD, 1), /* [2] */
1996 .str_sec = "\0__!int",
1997 .str_sec_size = sizeof("\0__!int"),
1998 .map_type = BPF_MAP_TYPE_ARRAY,
1999 .map_name = "typedef_check_btf",
2000 .key_size = sizeof(int),
2001 .value_size = sizeof(int),
2005 .btf_load_err = true,
2006 .err_str = "Invalid name",
2010 .descr = "ptr type (invalid name, name_off <> 0)",
2012 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2013 BTF_TYPE_ENC(NAME_TBD,
2014 BTF_INFO_ENC(BTF_KIND_PTR, 0, 0), 1), /* [2] */
2017 .str_sec = "\0__int",
2018 .str_sec_size = sizeof("\0__int"),
2019 .map_type = BPF_MAP_TYPE_ARRAY,
2020 .map_name = "ptr_type_check_btf",
2021 .key_size = sizeof(int),
2022 .value_size = sizeof(int),
2026 .btf_load_err = true,
2027 .err_str = "Invalid name",
2031 .descr = "volatile type (invalid name, name_off <> 0)",
2033 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2034 BTF_TYPE_ENC(NAME_TBD,
2035 BTF_INFO_ENC(BTF_KIND_VOLATILE, 0, 0), 1), /* [2] */
2038 .str_sec = "\0__int",
2039 .str_sec_size = sizeof("\0__int"),
2040 .map_type = BPF_MAP_TYPE_ARRAY,
2041 .map_name = "volatile_type_check_btf",
2042 .key_size = sizeof(int),
2043 .value_size = sizeof(int),
2047 .btf_load_err = true,
2048 .err_str = "Invalid name",
2052 .descr = "const type (invalid name, name_off <> 0)",
2054 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2055 BTF_TYPE_ENC(NAME_TBD,
2056 BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 1), /* [2] */
2059 .str_sec = "\0__int",
2060 .str_sec_size = sizeof("\0__int"),
2061 .map_type = BPF_MAP_TYPE_ARRAY,
2062 .map_name = "const_type_check_btf",
2063 .key_size = sizeof(int),
2064 .value_size = sizeof(int),
2068 .btf_load_err = true,
2069 .err_str = "Invalid name",
2073 .descr = "restrict type (invalid name, name_off <> 0)",
2075 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2076 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_PTR, 0, 0), 1), /* [2] */
2077 BTF_TYPE_ENC(NAME_TBD,
2078 BTF_INFO_ENC(BTF_KIND_RESTRICT, 0, 0), 2), /* [3] */
2081 .str_sec = "\0__int",
2082 .str_sec_size = sizeof("\0__int"),
2083 .map_type = BPF_MAP_TYPE_ARRAY,
2084 .map_name = "restrict_type_check_btf",
2085 .key_size = sizeof(int),
2086 .value_size = sizeof(int),
2090 .btf_load_err = true,
2091 .err_str = "Invalid name",
2095 .descr = "fwd type (invalid name, name_off = 0)",
2097 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2098 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_FWD, 0, 0), 0), /* [2] */
2101 .str_sec = "\0__skb",
2102 .str_sec_size = sizeof("\0__skb"),
2103 .map_type = BPF_MAP_TYPE_ARRAY,
2104 .map_name = "fwd_type_check_btf",
2105 .key_size = sizeof(int),
2106 .value_size = sizeof(int),
2110 .btf_load_err = true,
2111 .err_str = "Invalid name",
2115 .descr = "fwd type (invalid name, invalid identifier)",
2117 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2118 BTF_TYPE_ENC(NAME_TBD,
2119 BTF_INFO_ENC(BTF_KIND_FWD, 0, 0), 0), /* [2] */
2122 .str_sec = "\0__!skb",
2123 .str_sec_size = sizeof("\0__!skb"),
2124 .map_type = BPF_MAP_TYPE_ARRAY,
2125 .map_name = "fwd_type_check_btf",
2126 .key_size = sizeof(int),
2127 .value_size = sizeof(int),
2131 .btf_load_err = true,
2132 .err_str = "Invalid name",
2136 .descr = "array type (invalid name, name_off <> 0)",
2138 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2139 BTF_TYPE_ENC(NAME_TBD,
2140 BTF_INFO_ENC(BTF_KIND_ARRAY, 0, 0), 0), /* [2] */
2141 BTF_ARRAY_ENC(1, 1, 4),
2144 .str_sec = "\0__skb",
2145 .str_sec_size = sizeof("\0__skb"),
2146 .map_type = BPF_MAP_TYPE_ARRAY,
2147 .map_name = "array_type_check_btf",
2148 .key_size = sizeof(int),
2149 .value_size = sizeof(int),
2153 .btf_load_err = true,
2154 .err_str = "Invalid name",
2158 .descr = "struct type (name_off = 0)",
2160 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2162 BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 1), 4), /* [2] */
2163 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
2167 .str_sec_size = sizeof("\0A"),
2168 .map_type = BPF_MAP_TYPE_ARRAY,
2169 .map_name = "struct_type_check_btf",
2170 .key_size = sizeof(int),
2171 .value_size = sizeof(int),
2178 .descr = "struct type (invalid name, invalid identifier)",
2180 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2181 BTF_TYPE_ENC(NAME_TBD,
2182 BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 1), 4), /* [2] */
2183 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
2186 .str_sec = "\0A!\0B",
2187 .str_sec_size = sizeof("\0A!\0B"),
2188 .map_type = BPF_MAP_TYPE_ARRAY,
2189 .map_name = "struct_type_check_btf",
2190 .key_size = sizeof(int),
2191 .value_size = sizeof(int),
2195 .btf_load_err = true,
2196 .err_str = "Invalid name",
2200 .descr = "struct member (name_off = 0)",
2202 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2204 BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 1), 4), /* [2] */
2205 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
2209 .str_sec_size = sizeof("\0A"),
2210 .map_type = BPF_MAP_TYPE_ARRAY,
2211 .map_name = "struct_type_check_btf",
2212 .key_size = sizeof(int),
2213 .value_size = sizeof(int),
2220 .descr = "struct member (invalid name, invalid identifier)",
2222 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2223 BTF_TYPE_ENC(NAME_TBD,
2224 BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 1), 4), /* [2] */
2225 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
2228 .str_sec = "\0A\0B*",
2229 .str_sec_size = sizeof("\0A\0B*"),
2230 .map_type = BPF_MAP_TYPE_ARRAY,
2231 .map_name = "struct_type_check_btf",
2232 .key_size = sizeof(int),
2233 .value_size = sizeof(int),
2237 .btf_load_err = true,
2238 .err_str = "Invalid name",
2242 .descr = "enum type (name_off = 0)",
2244 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2246 BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1),
2247 sizeof(int)), /* [2] */
2248 BTF_ENUM_ENC(NAME_TBD, 0),
2251 .str_sec = "\0A\0B",
2252 .str_sec_size = sizeof("\0A\0B"),
2253 .map_type = BPF_MAP_TYPE_ARRAY,
2254 .map_name = "enum_type_check_btf",
2255 .key_size = sizeof(int),
2256 .value_size = sizeof(int),
2263 .descr = "enum type (invalid name, invalid identifier)",
2265 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2266 BTF_TYPE_ENC(NAME_TBD,
2267 BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1),
2268 sizeof(int)), /* [2] */
2269 BTF_ENUM_ENC(NAME_TBD, 0),
2272 .str_sec = "\0A!\0B",
2273 .str_sec_size = sizeof("\0A!\0B"),
2274 .map_type = BPF_MAP_TYPE_ARRAY,
2275 .map_name = "enum_type_check_btf",
2276 .key_size = sizeof(int),
2277 .value_size = sizeof(int),
2281 .btf_load_err = true,
2282 .err_str = "Invalid name",
2286 .descr = "enum member (invalid name, name_off = 0)",
2288 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2290 BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1),
2291 sizeof(int)), /* [2] */
2296 .str_sec_size = sizeof(""),
2297 .map_type = BPF_MAP_TYPE_ARRAY,
2298 .map_name = "enum_type_check_btf",
2299 .key_size = sizeof(int),
2300 .value_size = sizeof(int),
2304 .btf_load_err = true,
2305 .err_str = "Invalid name",
2309 .descr = "enum member (invalid name, invalid identifier)",
2311 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2313 BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1),
2314 sizeof(int)), /* [2] */
2315 BTF_ENUM_ENC(NAME_TBD, 0),
2319 .str_sec_size = sizeof("\0A!"),
2320 .map_type = BPF_MAP_TYPE_ARRAY,
2321 .map_name = "enum_type_check_btf",
2322 .key_size = sizeof(int),
2323 .value_size = sizeof(int),
2327 .btf_load_err = true,
2328 .err_str = "Invalid name",
2331 .descr = "arraymap invalid btf key (a bit field)",
2334 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
2335 /* 32 bit int with 32 bit offset */ /* [2] */
2336 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 32, 32, 8),
2340 .str_sec_size = sizeof(""),
2341 .map_type = BPF_MAP_TYPE_ARRAY,
2342 .map_name = "array_map_check_btf",
2343 .key_size = sizeof(int),
2344 .value_size = sizeof(int),
2348 .map_create_err = true,
2352 .descr = "arraymap invalid btf key (!= 32 bits)",
2355 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
2356 /* 16 bit int with 0 bit offset */ /* [2] */
2357 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 16, 2),
2361 .str_sec_size = sizeof(""),
2362 .map_type = BPF_MAP_TYPE_ARRAY,
2363 .map_name = "array_map_check_btf",
2364 .key_size = sizeof(int),
2365 .value_size = sizeof(int),
2369 .map_create_err = true,
2373 .descr = "arraymap invalid btf value (too small)",
2376 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
2380 .str_sec_size = sizeof(""),
2381 .map_type = BPF_MAP_TYPE_ARRAY,
2382 .map_name = "array_map_check_btf",
2383 .key_size = sizeof(int),
2384 /* btf_value_size < map->value_size */
2385 .value_size = sizeof(__u64),
2389 .map_create_err = true,
2393 .descr = "arraymap invalid btf value (too big)",
2396 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
2400 .str_sec_size = sizeof(""),
2401 .map_type = BPF_MAP_TYPE_ARRAY,
2402 .map_name = "array_map_check_btf",
2403 .key_size = sizeof(int),
2404 /* btf_value_size > map->value_size */
2405 .value_size = sizeof(__u16),
2409 .map_create_err = true,
2413 .descr = "func proto (int (*)(int, unsigned int))",
2415 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2416 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2417 /* int (*)(int, unsigned int) */
2418 BTF_FUNC_PROTO_ENC(1, 2), /* [3] */
2419 BTF_FUNC_PROTO_ARG_ENC(0, 1),
2420 BTF_FUNC_PROTO_ARG_ENC(0, 2),
2424 .str_sec_size = sizeof(""),
2425 .map_type = BPF_MAP_TYPE_ARRAY,
2426 .map_name = "func_proto_type_check_btf",
2427 .key_size = sizeof(int),
2428 .value_size = sizeof(int),
2435 .descr = "func proto (vararg)",
2437 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2438 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2439 /* void (*)(int, unsigned int, ...) */
2440 BTF_FUNC_PROTO_ENC(0, 3), /* [3] */
2441 BTF_FUNC_PROTO_ARG_ENC(0, 1),
2442 BTF_FUNC_PROTO_ARG_ENC(0, 2),
2443 BTF_FUNC_PROTO_ARG_ENC(0, 0),
2447 .str_sec_size = sizeof(""),
2448 .map_type = BPF_MAP_TYPE_ARRAY,
2449 .map_name = "func_proto_type_check_btf",
2450 .key_size = sizeof(int),
2451 .value_size = sizeof(int),
2458 .descr = "func proto (vararg with name)",
2460 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2461 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2462 /* void (*)(int a, unsigned int b, ... c) */
2463 BTF_FUNC_PROTO_ENC(0, 3), /* [3] */
2464 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
2465 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
2466 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 0),
2469 .str_sec = "\0a\0b\0c",
2470 .str_sec_size = sizeof("\0a\0b\0c"),
2471 .map_type = BPF_MAP_TYPE_ARRAY,
2472 .map_name = "func_proto_type_check_btf",
2473 .key_size = sizeof(int),
2474 .value_size = sizeof(int),
2478 .btf_load_err = true,
2479 .err_str = "Invalid arg#3",
2483 .descr = "func proto (arg after vararg)",
2485 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2486 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2487 /* void (*)(int a, ..., unsigned int b) */
2488 BTF_FUNC_PROTO_ENC(0, 3), /* [3] */
2489 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
2490 BTF_FUNC_PROTO_ARG_ENC(0, 0),
2491 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
2494 .str_sec = "\0a\0b",
2495 .str_sec_size = sizeof("\0a\0b"),
2496 .map_type = BPF_MAP_TYPE_ARRAY,
2497 .map_name = "func_proto_type_check_btf",
2498 .key_size = sizeof(int),
2499 .value_size = sizeof(int),
2503 .btf_load_err = true,
2504 .err_str = "Invalid arg#2",
2508 .descr = "func proto (CONST=>TYPEDEF=>PTR=>FUNC_PROTO)",
2510 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2511 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2512 /* typedef void (*func_ptr)(int, unsigned int) */
2513 BTF_TYPEDEF_ENC(NAME_TBD, 5), /* [3] */
2514 /* const func_ptr */
2515 BTF_CONST_ENC(3), /* [4] */
2516 BTF_PTR_ENC(6), /* [5] */
2517 BTF_FUNC_PROTO_ENC(0, 2), /* [6] */
2518 BTF_FUNC_PROTO_ARG_ENC(0, 1),
2519 BTF_FUNC_PROTO_ARG_ENC(0, 2),
2522 .str_sec = "\0func_ptr",
2523 .str_sec_size = sizeof("\0func_ptr"),
2524 .map_type = BPF_MAP_TYPE_ARRAY,
2525 .map_name = "func_proto_type_check_btf",
2526 .key_size = sizeof(int),
2527 .value_size = sizeof(int),
2534 .descr = "func proto (TYPEDEF=>FUNC_PROTO)",
2536 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2537 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2538 BTF_TYPEDEF_ENC(NAME_TBD, 4), /* [3] */
2539 BTF_FUNC_PROTO_ENC(0, 2), /* [4] */
2540 BTF_FUNC_PROTO_ARG_ENC(0, 1),
2541 BTF_FUNC_PROTO_ARG_ENC(0, 2),
2544 .str_sec = "\0func_typedef",
2545 .str_sec_size = sizeof("\0func_typedef"),
2546 .map_type = BPF_MAP_TYPE_ARRAY,
2547 .map_name = "func_proto_type_check_btf",
2548 .key_size = sizeof(int),
2549 .value_size = sizeof(int),
2556 .descr = "func proto (btf_resolve(arg))",
2558 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2559 /* void (*)(const void *) */
2560 BTF_FUNC_PROTO_ENC(0, 1), /* [2] */
2561 BTF_FUNC_PROTO_ARG_ENC(0, 3),
2562 BTF_CONST_ENC(4), /* [3] */
2563 BTF_PTR_ENC(0), /* [4] */
2567 .str_sec_size = sizeof(""),
2568 .map_type = BPF_MAP_TYPE_ARRAY,
2569 .map_name = "func_proto_type_check_btf",
2570 .key_size = sizeof(int),
2571 .value_size = sizeof(int),
2578 .descr = "func proto (Not all arg has name)",
2580 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2581 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2582 /* void (*)(int, unsigned int b) */
2583 BTF_FUNC_PROTO_ENC(0, 2), /* [3] */
2584 BTF_FUNC_PROTO_ARG_ENC(0, 1),
2585 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
2589 .str_sec_size = sizeof("\0b"),
2590 .map_type = BPF_MAP_TYPE_ARRAY,
2591 .map_name = "func_proto_type_check_btf",
2592 .key_size = sizeof(int),
2593 .value_size = sizeof(int),
2600 .descr = "func proto (Bad arg name_off)",
2602 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2603 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2604 /* void (*)(int a, unsigned int <bad_name_off>) */
2605 BTF_FUNC_PROTO_ENC(0, 2), /* [3] */
2606 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
2607 BTF_FUNC_PROTO_ARG_ENC(0x0fffffff, 2),
2611 .str_sec_size = sizeof("\0a"),
2612 .map_type = BPF_MAP_TYPE_ARRAY,
2613 .map_name = "func_proto_type_check_btf",
2614 .key_size = sizeof(int),
2615 .value_size = sizeof(int),
2619 .btf_load_err = true,
2620 .err_str = "Invalid arg#2",
2624 .descr = "func proto (Bad arg name)",
2626 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2627 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2628 /* void (*)(int a, unsigned int !!!) */
2629 BTF_FUNC_PROTO_ENC(0, 2), /* [3] */
2630 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
2631 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
2634 .str_sec = "\0a\0!!!",
2635 .str_sec_size = sizeof("\0a\0!!!"),
2636 .map_type = BPF_MAP_TYPE_ARRAY,
2637 .map_name = "func_proto_type_check_btf",
2638 .key_size = sizeof(int),
2639 .value_size = sizeof(int),
2643 .btf_load_err = true,
2644 .err_str = "Invalid arg#2",
2648 .descr = "func proto (Invalid return type)",
2650 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2651 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2652 /* <bad_ret_type> (*)(int, unsigned int) */
2653 BTF_FUNC_PROTO_ENC(100, 2), /* [3] */
2654 BTF_FUNC_PROTO_ARG_ENC(0, 1),
2655 BTF_FUNC_PROTO_ARG_ENC(0, 2),
2659 .str_sec_size = sizeof(""),
2660 .map_type = BPF_MAP_TYPE_ARRAY,
2661 .map_name = "func_proto_type_check_btf",
2662 .key_size = sizeof(int),
2663 .value_size = sizeof(int),
2667 .btf_load_err = true,
2668 .err_str = "Invalid return type",
2672 .descr = "func proto (with func name)",
2674 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2675 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2676 /* void func_proto(int, unsigned int) */
2677 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_FUNC_PROTO, 0, 2), 0), /* [3] */
2678 BTF_FUNC_PROTO_ARG_ENC(0, 1),
2679 BTF_FUNC_PROTO_ARG_ENC(0, 2),
2682 .str_sec = "\0func_proto",
2683 .str_sec_size = sizeof("\0func_proto"),
2684 .map_type = BPF_MAP_TYPE_ARRAY,
2685 .map_name = "func_proto_type_check_btf",
2686 .key_size = sizeof(int),
2687 .value_size = sizeof(int),
2691 .btf_load_err = true,
2692 .err_str = "Invalid name",
2696 .descr = "func proto (const void arg)",
2698 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2699 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2700 /* void (*)(const void) */
2701 BTF_FUNC_PROTO_ENC(0, 1), /* [3] */
2702 BTF_FUNC_PROTO_ARG_ENC(0, 4),
2703 BTF_CONST_ENC(0), /* [4] */
2707 .str_sec_size = sizeof(""),
2708 .map_type = BPF_MAP_TYPE_ARRAY,
2709 .map_name = "func_proto_type_check_btf",
2710 .key_size = sizeof(int),
2711 .value_size = sizeof(int),
2715 .btf_load_err = true,
2716 .err_str = "Invalid arg#1",
2720 .descr = "func (void func(int a, unsigned int b))",
2722 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2723 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2724 /* void (*)(int a, unsigned int b) */
2725 BTF_FUNC_PROTO_ENC(0, 2), /* [3] */
2726 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
2727 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
2728 /* void func(int a, unsigned int b) */
2729 BTF_FUNC_ENC(NAME_TBD, 3), /* [4] */
2732 .str_sec = "\0a\0b\0func",
2733 .str_sec_size = sizeof("\0a\0b\0func"),
2734 .map_type = BPF_MAP_TYPE_ARRAY,
2735 .map_name = "func_type_check_btf",
2736 .key_size = sizeof(int),
2737 .value_size = sizeof(int),
2744 .descr = "func (No func name)",
2746 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2747 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2748 /* void (*)(int a, unsigned int b) */
2749 BTF_FUNC_PROTO_ENC(0, 2), /* [3] */
2750 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
2751 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
2752 /* void <no_name>(int a, unsigned int b) */
2753 BTF_FUNC_ENC(0, 3), /* [4] */
2756 .str_sec = "\0a\0b",
2757 .str_sec_size = sizeof("\0a\0b"),
2758 .map_type = BPF_MAP_TYPE_ARRAY,
2759 .map_name = "func_type_check_btf",
2760 .key_size = sizeof(int),
2761 .value_size = sizeof(int),
2765 .btf_load_err = true,
2766 .err_str = "Invalid name",
2770 .descr = "func (Invalid func name)",
2772 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2773 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2774 /* void (*)(int a, unsigned int b) */
2775 BTF_FUNC_PROTO_ENC(0, 2), /* [3] */
2776 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
2777 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
2778 /* void !!!(int a, unsigned int b) */
2779 BTF_FUNC_ENC(NAME_TBD, 3), /* [4] */
2782 .str_sec = "\0a\0b\0!!!",
2783 .str_sec_size = sizeof("\0a\0b\0!!!"),
2784 .map_type = BPF_MAP_TYPE_ARRAY,
2785 .map_name = "func_type_check_btf",
2786 .key_size = sizeof(int),
2787 .value_size = sizeof(int),
2791 .btf_load_err = true,
2792 .err_str = "Invalid name",
2796 .descr = "func (Some arg has no name)",
2798 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2799 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2800 /* void (*)(int a, unsigned int) */
2801 BTF_FUNC_PROTO_ENC(0, 2), /* [3] */
2802 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
2803 BTF_FUNC_PROTO_ARG_ENC(0, 2),
2804 /* void func(int a, unsigned int) */
2805 BTF_FUNC_ENC(NAME_TBD, 3), /* [4] */
2808 .str_sec = "\0a\0func",
2809 .str_sec_size = sizeof("\0a\0func"),
2810 .map_type = BPF_MAP_TYPE_ARRAY,
2811 .map_name = "func_type_check_btf",
2812 .key_size = sizeof(int),
2813 .value_size = sizeof(int),
2817 .btf_load_err = true,
2818 .err_str = "Invalid arg#2",
2822 .descr = "func (Non zero vlen)",
2824 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2825 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [2] */
2826 /* void (*)(int a, unsigned int b) */
2827 BTF_FUNC_PROTO_ENC(0, 2), /* [3] */
2828 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
2829 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
2830 /* void func(int a, unsigned int b) */
2831 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_FUNC, 0, 2), 3), /* [4] */
2834 .str_sec = "\0a\0b\0func",
2835 .str_sec_size = sizeof("\0a\0b\0func"),
2836 .map_type = BPF_MAP_TYPE_ARRAY,
2837 .map_name = "func_type_check_btf",
2838 .key_size = sizeof(int),
2839 .value_size = sizeof(int),
2843 .btf_load_err = true,
2844 .err_str = "Invalid func linkage",
2848 .descr = "func (Not referring to FUNC_PROTO)",
2850 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2851 BTF_FUNC_ENC(NAME_TBD, 1), /* [2] */
2854 .str_sec = "\0func",
2855 .str_sec_size = sizeof("\0func"),
2856 .map_type = BPF_MAP_TYPE_ARRAY,
2857 .map_name = "func_type_check_btf",
2858 .key_size = sizeof(int),
2859 .value_size = sizeof(int),
2863 .btf_load_err = true,
2864 .err_str = "Invalid type_id",
2868 .descr = "invalid int kind_flag",
2870 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2871 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_INT, 1, 0), 4), /* [2] */
2872 BTF_INT_ENC(0, 0, 32),
2876 .map_type = BPF_MAP_TYPE_ARRAY,
2877 .map_name = "int_type_check_btf",
2878 .key_size = sizeof(int),
2879 .value_size = sizeof(int),
2883 .btf_load_err = true,
2884 .err_str = "Invalid btf_info kind_flag",
2888 .descr = "invalid ptr kind_flag",
2890 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2891 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_PTR, 1, 0), 1), /* [2] */
2895 .map_type = BPF_MAP_TYPE_ARRAY,
2896 .map_name = "ptr_type_check_btf",
2897 .key_size = sizeof(int),
2898 .value_size = sizeof(int),
2902 .btf_load_err = true,
2903 .err_str = "Invalid btf_info kind_flag",
2907 .descr = "invalid array kind_flag",
2909 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2910 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_ARRAY, 1, 0), 0), /* [2] */
2911 BTF_ARRAY_ENC(1, 1, 1),
2915 .map_type = BPF_MAP_TYPE_ARRAY,
2916 .map_name = "array_type_check_btf",
2917 .key_size = sizeof(int),
2918 .value_size = sizeof(int),
2922 .btf_load_err = true,
2923 .err_str = "Invalid btf_info kind_flag",
2927 .descr = "valid fwd kind_flag",
2929 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2930 BTF_TYPE_ENC(NAME_TBD,
2931 BTF_INFO_ENC(BTF_KIND_FWD, 1, 0), 0), /* [2] */
2935 .map_type = BPF_MAP_TYPE_ARRAY,
2936 .map_name = "fwd_type_check_btf",
2937 .key_size = sizeof(int),
2938 .value_size = sizeof(int),
2945 .descr = "invalid typedef kind_flag",
2947 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2948 BTF_TYPE_ENC(NAME_TBD,
2949 BTF_INFO_ENC(BTF_KIND_TYPEDEF, 1, 0), 1), /* [2] */
2953 .map_type = BPF_MAP_TYPE_ARRAY,
2954 .map_name = "typedef_type_check_btf",
2955 .key_size = sizeof(int),
2956 .value_size = sizeof(int),
2960 .btf_load_err = true,
2961 .err_str = "Invalid btf_info kind_flag",
2965 .descr = "invalid volatile kind_flag",
2967 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2968 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_VOLATILE, 1, 0), 1), /* [2] */
2972 .map_type = BPF_MAP_TYPE_ARRAY,
2973 .map_name = "volatile_type_check_btf",
2974 .key_size = sizeof(int),
2975 .value_size = sizeof(int),
2979 .btf_load_err = true,
2980 .err_str = "Invalid btf_info kind_flag",
2984 .descr = "invalid const kind_flag",
2986 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
2987 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 1, 0), 1), /* [2] */
2991 .map_type = BPF_MAP_TYPE_ARRAY,
2992 .map_name = "const_type_check_btf",
2993 .key_size = sizeof(int),
2994 .value_size = sizeof(int),
2998 .btf_load_err = true,
2999 .err_str = "Invalid btf_info kind_flag",
3003 .descr = "invalid restrict kind_flag",
3005 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3006 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_RESTRICT, 1, 0), 1), /* [2] */
3010 .map_type = BPF_MAP_TYPE_ARRAY,
3011 .map_name = "restrict_type_check_btf",
3012 .key_size = sizeof(int),
3013 .value_size = sizeof(int),
3017 .btf_load_err = true,
3018 .err_str = "Invalid btf_info kind_flag",
3022 .descr = "invalid func kind_flag",
3024 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3025 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_FUNC_PROTO, 0, 0), 0), /* [2] */
3026 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_FUNC, 1, 0), 2), /* [3] */
3030 .map_type = BPF_MAP_TYPE_ARRAY,
3031 .map_name = "func_type_check_btf",
3032 .key_size = sizeof(int),
3033 .value_size = sizeof(int),
3037 .btf_load_err = true,
3038 .err_str = "Invalid btf_info kind_flag",
3042 .descr = "invalid func_proto kind_flag",
3044 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3045 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_FUNC_PROTO, 1, 0), 0), /* [2] */
3049 .map_type = BPF_MAP_TYPE_ARRAY,
3050 .map_name = "func_proto_type_check_btf",
3051 .key_size = sizeof(int),
3052 .value_size = sizeof(int),
3056 .btf_load_err = true,
3057 .err_str = "Invalid btf_info kind_flag",
3061 .descr = "valid struct, kind_flag, bitfield_size = 0",
3063 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3064 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 2), 8), /* [2] */
3065 BTF_MEMBER_ENC(NAME_TBD, 1, BTF_MEMBER_OFFSET(0, 0)),
3066 BTF_MEMBER_ENC(NAME_TBD, 1, BTF_MEMBER_OFFSET(0, 32)),
3069 BTF_STR_SEC("\0A\0B"),
3070 .map_type = BPF_MAP_TYPE_ARRAY,
3071 .map_name = "struct_type_check_btf",
3072 .key_size = sizeof(int),
3073 .value_size = sizeof(int),
3080 .descr = "valid struct, kind_flag, int member, bitfield_size != 0",
3082 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3083 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 2), 4), /* [2] */
3084 BTF_MEMBER_ENC(NAME_TBD, 1, BTF_MEMBER_OFFSET(4, 0)),
3085 BTF_MEMBER_ENC(NAME_TBD, 1, BTF_MEMBER_OFFSET(4, 4)),
3088 BTF_STR_SEC("\0A\0B"),
3089 .map_type = BPF_MAP_TYPE_ARRAY,
3090 .map_name = "struct_type_check_btf",
3091 .key_size = sizeof(int),
3092 .value_size = sizeof(int),
3099 .descr = "valid union, kind_flag, int member, bitfield_size != 0",
3101 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3102 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_UNION, 1, 2), 4), /* [2] */
3103 BTF_MEMBER_ENC(NAME_TBD, 1, BTF_MEMBER_OFFSET(4, 0)),
3104 BTF_MEMBER_ENC(NAME_TBD, 1, BTF_MEMBER_OFFSET(4, 0)),
3107 BTF_STR_SEC("\0A\0B"),
3108 .map_type = BPF_MAP_TYPE_ARRAY,
3109 .map_name = "union_type_check_btf",
3110 .key_size = sizeof(int),
3111 .value_size = sizeof(int),
3118 .descr = "valid struct, kind_flag, enum member, bitfield_size != 0",
3120 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3121 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4), /* [2] */
3122 BTF_ENUM_ENC(NAME_TBD, 0),
3123 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 2), 4),/* [3] */
3124 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(4, 0)),
3125 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(4, 4)),
3128 BTF_STR_SEC("\0A\0B\0C"),
3129 .map_type = BPF_MAP_TYPE_ARRAY,
3130 .map_name = "struct_type_check_btf",
3131 .key_size = sizeof(int),
3132 .value_size = sizeof(int),
3139 .descr = "valid union, kind_flag, enum member, bitfield_size != 0",
3141 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3142 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4), /* [2] */
3143 BTF_ENUM_ENC(NAME_TBD, 0),
3144 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_UNION, 1, 2), 4), /* [3] */
3145 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(4, 0)),
3146 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(4, 0)),
3149 BTF_STR_SEC("\0A\0B\0C"),
3150 .map_type = BPF_MAP_TYPE_ARRAY,
3151 .map_name = "union_type_check_btf",
3152 .key_size = sizeof(int),
3153 .value_size = sizeof(int),
3160 .descr = "valid struct, kind_flag, typedef member, bitfield_size != 0",
3162 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3163 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4), /* [2] */
3164 BTF_ENUM_ENC(NAME_TBD, 0),
3165 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 2), 4),/* [3] */
3166 BTF_MEMBER_ENC(NAME_TBD, 4, BTF_MEMBER_OFFSET(4, 0)),
3167 BTF_MEMBER_ENC(NAME_TBD, 5, BTF_MEMBER_OFFSET(4, 4)),
3168 BTF_TYPEDEF_ENC(NAME_TBD, 1), /* [4] */
3169 BTF_TYPEDEF_ENC(NAME_TBD, 2), /* [5] */
3172 BTF_STR_SEC("\0A\0B\0C\0D\0E"),
3173 .map_type = BPF_MAP_TYPE_ARRAY,
3174 .map_name = "struct_type_check_btf",
3175 .key_size = sizeof(int),
3176 .value_size = sizeof(int),
3183 .descr = "valid union, kind_flag, typedef member, bitfield_size != 0",
3185 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3186 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4), /* [2] */
3187 BTF_ENUM_ENC(NAME_TBD, 0),
3188 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_UNION, 1, 2), 4), /* [3] */
3189 BTF_MEMBER_ENC(NAME_TBD, 4, BTF_MEMBER_OFFSET(4, 0)),
3190 BTF_MEMBER_ENC(NAME_TBD, 5, BTF_MEMBER_OFFSET(4, 0)),
3191 BTF_TYPEDEF_ENC(NAME_TBD, 1), /* [4] */
3192 BTF_TYPEDEF_ENC(NAME_TBD, 2), /* [5] */
3195 BTF_STR_SEC("\0A\0B\0C\0D\0E"),
3196 .map_type = BPF_MAP_TYPE_ARRAY,
3197 .map_name = "union_type_check_btf",
3198 .key_size = sizeof(int),
3199 .value_size = sizeof(int),
3206 .descr = "invalid struct, kind_flag, bitfield_size greater than struct size",
3208 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3209 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 2), 4), /* [2] */
3210 BTF_MEMBER_ENC(NAME_TBD, 1, BTF_MEMBER_OFFSET(20, 0)),
3211 BTF_MEMBER_ENC(NAME_TBD, 1, BTF_MEMBER_OFFSET(20, 20)),
3214 BTF_STR_SEC("\0A\0B"),
3215 .map_type = BPF_MAP_TYPE_ARRAY,
3216 .map_name = "struct_type_check_btf",
3217 .key_size = sizeof(int),
3218 .value_size = sizeof(int),
3222 .btf_load_err = true,
3223 .err_str = "Member exceeds struct_size",
3227 .descr = "invalid struct, kind_flag, bitfield base_type int not regular",
3229 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3230 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 20, 4), /* [2] */
3231 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 2), 4), /* [3] */
3232 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(20, 0)),
3233 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(20, 20)),
3236 BTF_STR_SEC("\0A\0B"),
3237 .map_type = BPF_MAP_TYPE_ARRAY,
3238 .map_name = "struct_type_check_btf",
3239 .key_size = sizeof(int),
3240 .value_size = sizeof(int),
3244 .btf_load_err = true,
3245 .err_str = "Invalid member base type",
3249 .descr = "invalid struct, kind_flag, base_type int not regular",
3251 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3252 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 12, 4), /* [2] */
3253 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 2), 4), /* [3] */
3254 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(8, 0)),
3255 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(8, 8)),
3258 BTF_STR_SEC("\0A\0B"),
3259 .map_type = BPF_MAP_TYPE_ARRAY,
3260 .map_name = "struct_type_check_btf",
3261 .key_size = sizeof(int),
3262 .value_size = sizeof(int),
3266 .btf_load_err = true,
3267 .err_str = "Invalid member base type",
3271 .descr = "invalid union, kind_flag, bitfield_size greater than struct size",
3273 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3274 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_UNION, 1, 2), 2), /* [2] */
3275 BTF_MEMBER_ENC(NAME_TBD, 1, BTF_MEMBER_OFFSET(8, 0)),
3276 BTF_MEMBER_ENC(NAME_TBD, 1, BTF_MEMBER_OFFSET(20, 0)),
3279 BTF_STR_SEC("\0A\0B"),
3280 .map_type = BPF_MAP_TYPE_ARRAY,
3281 .map_name = "union_type_check_btf",
3282 .key_size = sizeof(int),
3283 .value_size = sizeof(int),
3287 .btf_load_err = true,
3288 .err_str = "Member exceeds struct_size",
3292 .descr = "invalid struct, kind_flag, int member, bitfield_size = 0, wrong byte alignment",
3294 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3295 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [2] */
3296 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 2), 12), /* [3] */
3297 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(0, 0)),
3298 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(0, 36)),
3301 BTF_STR_SEC("\0A\0B"),
3302 .map_type = BPF_MAP_TYPE_ARRAY,
3303 .map_name = "struct_type_check_btf",
3304 .key_size = sizeof(int),
3305 .value_size = sizeof(int),
3309 .btf_load_err = true,
3310 .err_str = "Invalid member offset",
3314 .descr = "invalid struct, kind_flag, enum member, bitfield_size = 0, wrong byte alignment",
3316 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3317 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [2] */
3318 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4), /* [2] */
3319 BTF_ENUM_ENC(NAME_TBD, 0),
3320 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 2), 12), /* [3] */
3321 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(0, 0)),
3322 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(0, 36)),
3325 BTF_STR_SEC("\0A\0B\0C"),
3326 .map_type = BPF_MAP_TYPE_ARRAY,
3327 .map_name = "struct_type_check_btf",
3328 .key_size = sizeof(int),
3329 .value_size = sizeof(int),
3333 .btf_load_err = true,
3334 .err_str = "Invalid member offset",
3338 .descr = "128-bit int",
3340 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3341 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 128, 16), /* [2] */
3345 .map_type = BPF_MAP_TYPE_ARRAY,
3346 .map_name = "int_type_check_btf",
3347 .key_size = sizeof(int),
3348 .value_size = sizeof(int),
3355 .descr = "struct, 128-bit int member",
3357 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3358 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 128, 16), /* [2] */
3359 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 1), 16), /* [3] */
3360 BTF_MEMBER_ENC(NAME_TBD, 2, 0),
3364 .map_type = BPF_MAP_TYPE_ARRAY,
3365 .map_name = "struct_type_check_btf",
3366 .key_size = sizeof(int),
3367 .value_size = sizeof(int),
3374 .descr = "struct, 120-bit int member bitfield",
3376 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3377 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 120, 16), /* [2] */
3378 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 1), 16), /* [3] */
3379 BTF_MEMBER_ENC(NAME_TBD, 2, 0),
3383 .map_type = BPF_MAP_TYPE_ARRAY,
3384 .map_name = "struct_type_check_btf",
3385 .key_size = sizeof(int),
3386 .value_size = sizeof(int),
3393 .descr = "struct, kind_flag, 128-bit int member",
3395 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3396 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 128, 16), /* [2] */
3397 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 1), 16), /* [3] */
3398 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(0, 0)),
3402 .map_type = BPF_MAP_TYPE_ARRAY,
3403 .map_name = "struct_type_check_btf",
3404 .key_size = sizeof(int),
3405 .value_size = sizeof(int),
3412 .descr = "struct, kind_flag, 120-bit int member bitfield",
3414 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3415 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 128, 16), /* [2] */
3416 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 1), 16), /* [3] */
3417 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(120, 0)),
3421 .map_type = BPF_MAP_TYPE_ARRAY,
3422 .map_name = "struct_type_check_btf",
3423 .key_size = sizeof(int),
3424 .value_size = sizeof(int),
3430 * typedef int arr_t[16];
3436 .descr = "struct->ptr->typedef->array->int size resolution",
3438 BTF_STRUCT_ENC(NAME_TBD, 1, 8), /* [1] */
3439 BTF_MEMBER_ENC(NAME_TBD, 2, 0),
3440 BTF_PTR_ENC(3), /* [2] */
3441 BTF_TYPEDEF_ENC(NAME_TBD, 4), /* [3] */
3442 BTF_TYPE_ARRAY_ENC(5, 5, 16), /* [4] */
3443 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [5] */
3446 BTF_STR_SEC("\0s\0a\0arr_t"),
3447 .map_type = BPF_MAP_TYPE_ARRAY,
3448 .map_name = "ptr_mod_chain_size_resolve_map",
3449 .key_size = sizeof(int),
3450 .value_size = sizeof(int) * 16,
3451 .key_type_id = 5 /* int */,
3452 .value_type_id = 3 /* arr_t */,
3456 * typedef int arr_t[16][8][4];
3462 .descr = "struct->ptr->typedef->multi-array->int size resolution",
3464 BTF_STRUCT_ENC(NAME_TBD, 1, 8), /* [1] */
3465 BTF_MEMBER_ENC(NAME_TBD, 2, 0),
3466 BTF_PTR_ENC(3), /* [2] */
3467 BTF_TYPEDEF_ENC(NAME_TBD, 4), /* [3] */
3468 BTF_TYPE_ARRAY_ENC(5, 7, 16), /* [4] */
3469 BTF_TYPE_ARRAY_ENC(6, 7, 8), /* [5] */
3470 BTF_TYPE_ARRAY_ENC(7, 7, 4), /* [6] */
3471 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [7] */
3474 BTF_STR_SEC("\0s\0a\0arr_t"),
3475 .map_type = BPF_MAP_TYPE_ARRAY,
3476 .map_name = "multi_arr_size_resolve_map",
3477 .key_size = sizeof(int),
3478 .value_size = sizeof(int) * 16 * 8 * 4,
3479 .key_type_id = 7 /* int */,
3480 .value_type_id = 3 /* arr_t */,
3484 * typedef int int_t;
3485 * typedef int_t arr3_t[4];
3486 * typedef arr3_t arr2_t[8];
3487 * typedef arr2_t arr1_t[16];
3493 .descr = "typedef/multi-arr mix size resolution",
3495 BTF_STRUCT_ENC(NAME_TBD, 1, 8), /* [1] */
3496 BTF_MEMBER_ENC(NAME_TBD, 2, 0),
3497 BTF_PTR_ENC(3), /* [2] */
3498 BTF_TYPEDEF_ENC(NAME_TBD, 4), /* [3] */
3499 BTF_TYPE_ARRAY_ENC(5, 10, 16), /* [4] */
3500 BTF_TYPEDEF_ENC(NAME_TBD, 6), /* [5] */
3501 BTF_TYPE_ARRAY_ENC(7, 10, 8), /* [6] */
3502 BTF_TYPEDEF_ENC(NAME_TBD, 8), /* [7] */
3503 BTF_TYPE_ARRAY_ENC(9, 10, 4), /* [8] */
3504 BTF_TYPEDEF_ENC(NAME_TBD, 10), /* [9] */
3505 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [10] */
3508 BTF_STR_SEC("\0s\0a\0arr1_t\0arr2_t\0arr3_t\0int_t"),
3509 .map_type = BPF_MAP_TYPE_ARRAY,
3510 .map_name = "typedef_arra_mix_size_resolve_map",
3511 .key_size = sizeof(int),
3512 .value_size = sizeof(int) * 16 * 8 * 4,
3513 .key_type_id = 10 /* int */,
3514 .value_type_id = 3 /* arr_t */,
3518 * elf .rodata section size 4 and btf .rodata section vlen 0.
3521 .descr = "datasec: vlen == 0",
3524 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3525 /* .rodata section */
3526 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 0), 4),
3530 BTF_STR_SEC("\0.rodata"),
3531 .map_type = BPF_MAP_TYPE_ARRAY,
3532 .key_size = sizeof(int),
3533 .value_size = sizeof(int),
3540 .descr = "float test #1, well-formed",
3542 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
3544 BTF_TYPE_FLOAT_ENC(NAME_TBD, 2), /* [2] */
3545 BTF_TYPE_FLOAT_ENC(NAME_TBD, 4), /* [3] */
3546 BTF_TYPE_FLOAT_ENC(NAME_TBD, 8), /* [4] */
3547 BTF_TYPE_FLOAT_ENC(NAME_TBD, 12), /* [5] */
3548 BTF_TYPE_FLOAT_ENC(NAME_TBD, 16), /* [6] */
3549 BTF_STRUCT_ENC(NAME_TBD, 5, 48), /* [7] */
3550 BTF_MEMBER_ENC(NAME_TBD, 2, 0),
3551 BTF_MEMBER_ENC(NAME_TBD, 3, 32),
3552 BTF_MEMBER_ENC(NAME_TBD, 4, 64),
3553 BTF_MEMBER_ENC(NAME_TBD, 5, 128),
3554 BTF_MEMBER_ENC(NAME_TBD, 6, 256),
3557 BTF_STR_SEC("\0int\0_Float16\0float\0double\0_Float80\0long_double"
3558 "\0floats\0a\0b\0c\0d\0e"),
3559 .map_type = BPF_MAP_TYPE_ARRAY,
3560 .map_name = "float_type_check_btf",
3561 .key_size = sizeof(int),
3568 .descr = "float test #2, invalid vlen",
3570 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
3572 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_FLOAT, 0, 1), 4),
3576 BTF_STR_SEC("\0int\0float"),
3577 .map_type = BPF_MAP_TYPE_ARRAY,
3578 .map_name = "float_type_check_btf",
3579 .key_size = sizeof(int),
3584 .btf_load_err = true,
3585 .err_str = "vlen != 0",
3588 .descr = "float test #3, invalid kind_flag",
3590 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
3592 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_FLOAT, 1, 0), 4),
3596 BTF_STR_SEC("\0int\0float"),
3597 .map_type = BPF_MAP_TYPE_ARRAY,
3598 .map_name = "float_type_check_btf",
3599 .key_size = sizeof(int),
3604 .btf_load_err = true,
3605 .err_str = "Invalid btf_info kind_flag",
3608 .descr = "float test #4, member does not fit",
3610 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
3612 BTF_TYPE_FLOAT_ENC(NAME_TBD, 4), /* [2] */
3613 BTF_STRUCT_ENC(NAME_TBD, 1, 2), /* [3] */
3614 BTF_MEMBER_ENC(NAME_TBD, 2, 0),
3617 BTF_STR_SEC("\0int\0float\0floats\0x"),
3618 .map_type = BPF_MAP_TYPE_ARRAY,
3619 .map_name = "float_type_check_btf",
3620 .key_size = sizeof(int),
3625 .btf_load_err = true,
3626 .err_str = "Member exceeds struct_size",
3629 .descr = "float test #5, member is not properly aligned",
3631 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
3633 BTF_TYPE_FLOAT_ENC(NAME_TBD, 4), /* [2] */
3634 BTF_STRUCT_ENC(NAME_TBD, 1, 8), /* [3] */
3635 BTF_MEMBER_ENC(NAME_TBD, 2, 8),
3638 BTF_STR_SEC("\0int\0float\0floats\0x"),
3639 .map_type = BPF_MAP_TYPE_ARRAY,
3640 .map_name = "float_type_check_btf",
3641 .key_size = sizeof(int),
3646 .btf_load_err = true,
3647 .err_str = "Member is not properly aligned",
3650 .descr = "float test #6, invalid size",
3652 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
3654 BTF_TYPE_FLOAT_ENC(NAME_TBD, 6), /* [2] */
3657 BTF_STR_SEC("\0int\0float"),
3658 .map_type = BPF_MAP_TYPE_ARRAY,
3659 .map_name = "float_type_check_btf",
3660 .key_size = sizeof(int),
3665 .btf_load_err = true,
3666 .err_str = "Invalid type_size",
3670 .descr = "decl_tag test #1, struct/member, well-formed",
3672 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3673 BTF_STRUCT_ENC(0, 2, 8), /* [2] */
3674 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
3675 BTF_MEMBER_ENC(NAME_TBD, 1, 32),
3676 BTF_DECL_TAG_ENC(NAME_TBD, 2, -1),
3677 BTF_DECL_TAG_ENC(NAME_TBD, 2, 0),
3678 BTF_DECL_TAG_ENC(NAME_TBD, 2, 1),
3681 BTF_STR_SEC("\0m1\0m2\0tag1\0tag2\0tag3"),
3682 .map_type = BPF_MAP_TYPE_ARRAY,
3683 .map_name = "tag_type_check_btf",
3684 .key_size = sizeof(int),
3691 .descr = "decl_tag test #2, union/member, well-formed",
3693 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3694 BTF_UNION_ENC(NAME_TBD, 2, 4), /* [2] */
3695 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
3696 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
3697 BTF_DECL_TAG_ENC(NAME_TBD, 2, -1),
3698 BTF_DECL_TAG_ENC(NAME_TBD, 2, 0),
3699 BTF_DECL_TAG_ENC(NAME_TBD, 2, 1),
3702 BTF_STR_SEC("\0t\0m1\0m2\0tag1\0tag2\0tag3"),
3703 .map_type = BPF_MAP_TYPE_ARRAY,
3704 .map_name = "tag_type_check_btf",
3705 .key_size = sizeof(int),
3712 .descr = "decl_tag test #3, variable, well-formed",
3714 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3715 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [2] */
3716 BTF_VAR_ENC(NAME_TBD, 1, 1), /* [3] */
3717 BTF_DECL_TAG_ENC(NAME_TBD, 2, -1),
3718 BTF_DECL_TAG_ENC(NAME_TBD, 3, -1),
3721 BTF_STR_SEC("\0local\0global\0tag1\0tag2"),
3722 .map_type = BPF_MAP_TYPE_ARRAY,
3723 .map_name = "tag_type_check_btf",
3724 .key_size = sizeof(int),
3731 .descr = "decl_tag test #4, func/parameter, well-formed",
3733 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3734 BTF_FUNC_PROTO_ENC(0, 2), /* [2] */
3735 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
3736 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
3737 BTF_FUNC_ENC(NAME_TBD, 2), /* [3] */
3738 BTF_DECL_TAG_ENC(NAME_TBD, 3, -1),
3739 BTF_DECL_TAG_ENC(NAME_TBD, 3, 0),
3740 BTF_DECL_TAG_ENC(NAME_TBD, 3, 1),
3743 BTF_STR_SEC("\0arg1\0arg2\0f\0tag1\0tag2\0tag3"),
3744 .map_type = BPF_MAP_TYPE_ARRAY,
3745 .map_name = "tag_type_check_btf",
3746 .key_size = sizeof(int),
3753 .descr = "decl_tag test #5, invalid value",
3755 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3756 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [2] */
3757 BTF_DECL_TAG_ENC(0, 2, -1),
3760 BTF_STR_SEC("\0local\0tag"),
3761 .map_type = BPF_MAP_TYPE_ARRAY,
3762 .map_name = "tag_type_check_btf",
3763 .key_size = sizeof(int),
3768 .btf_load_err = true,
3769 .err_str = "Invalid value",
3772 .descr = "decl_tag test #6, invalid target type",
3774 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3775 BTF_DECL_TAG_ENC(NAME_TBD, 1, -1),
3778 BTF_STR_SEC("\0tag1"),
3779 .map_type = BPF_MAP_TYPE_ARRAY,
3780 .map_name = "tag_type_check_btf",
3781 .key_size = sizeof(int),
3786 .btf_load_err = true,
3787 .err_str = "Invalid type",
3790 .descr = "decl_tag test #7, invalid vlen",
3792 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3793 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [2] */
3794 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DECL_TAG, 0, 1), 2), (0),
3797 BTF_STR_SEC("\0local\0tag1"),
3798 .map_type = BPF_MAP_TYPE_ARRAY,
3799 .map_name = "tag_type_check_btf",
3800 .key_size = sizeof(int),
3805 .btf_load_err = true,
3806 .err_str = "vlen != 0",
3809 .descr = "decl_tag test #8, invalid kflag",
3811 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3812 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [2] */
3813 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DECL_TAG, 1, 0), 2), (-1),
3816 BTF_STR_SEC("\0local\0tag1"),
3817 .map_type = BPF_MAP_TYPE_ARRAY,
3818 .map_name = "tag_type_check_btf",
3819 .key_size = sizeof(int),
3824 .btf_load_err = true,
3825 .err_str = "Invalid btf_info kind_flag",
3828 .descr = "decl_tag test #9, var, invalid component_idx",
3830 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3831 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [2] */
3832 BTF_DECL_TAG_ENC(NAME_TBD, 2, 0),
3835 BTF_STR_SEC("\0local\0tag"),
3836 .map_type = BPF_MAP_TYPE_ARRAY,
3837 .map_name = "tag_type_check_btf",
3838 .key_size = sizeof(int),
3843 .btf_load_err = true,
3844 .err_str = "Invalid component_idx",
3847 .descr = "decl_tag test #10, struct member, invalid component_idx",
3849 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3850 BTF_STRUCT_ENC(0, 2, 8), /* [2] */
3851 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
3852 BTF_MEMBER_ENC(NAME_TBD, 1, 32),
3853 BTF_DECL_TAG_ENC(NAME_TBD, 2, 2),
3856 BTF_STR_SEC("\0m1\0m2\0tag"),
3857 .map_type = BPF_MAP_TYPE_ARRAY,
3858 .map_name = "tag_type_check_btf",
3859 .key_size = sizeof(int),
3864 .btf_load_err = true,
3865 .err_str = "Invalid component_idx",
3868 .descr = "decl_tag test #11, func parameter, invalid component_idx",
3870 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3871 BTF_FUNC_PROTO_ENC(0, 2), /* [2] */
3872 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
3873 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
3874 BTF_FUNC_ENC(NAME_TBD, 2), /* [3] */
3875 BTF_DECL_TAG_ENC(NAME_TBD, 3, 2),
3878 BTF_STR_SEC("\0arg1\0arg2\0f\0tag"),
3879 .map_type = BPF_MAP_TYPE_ARRAY,
3880 .map_name = "tag_type_check_btf",
3881 .key_size = sizeof(int),
3886 .btf_load_err = true,
3887 .err_str = "Invalid component_idx",
3890 .descr = "decl_tag test #12, < -1 component_idx",
3892 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3893 BTF_FUNC_PROTO_ENC(0, 2), /* [2] */
3894 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
3895 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
3896 BTF_FUNC_ENC(NAME_TBD, 2), /* [3] */
3897 BTF_DECL_TAG_ENC(NAME_TBD, 3, -2),
3900 BTF_STR_SEC("\0arg1\0arg2\0f\0tag"),
3901 .map_type = BPF_MAP_TYPE_ARRAY,
3902 .map_name = "tag_type_check_btf",
3903 .key_size = sizeof(int),
3908 .btf_load_err = true,
3909 .err_str = "Invalid component_idx",
3912 .descr = "decl_tag test #13, typedef, well-formed",
3914 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3915 BTF_TYPEDEF_ENC(NAME_TBD, 1), /* [2] */
3916 BTF_DECL_TAG_ENC(NAME_TBD, 2, -1),
3919 BTF_STR_SEC("\0t\0tag"),
3920 .map_type = BPF_MAP_TYPE_ARRAY,
3921 .map_name = "tag_type_check_btf",
3922 .key_size = sizeof(int),
3929 .descr = "decl_tag test #14, typedef, invalid component_idx",
3931 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3932 BTF_TYPEDEF_ENC(NAME_TBD, 1), /* [2] */
3933 BTF_DECL_TAG_ENC(NAME_TBD, 2, 0),
3936 BTF_STR_SEC("\0local\0tag"),
3937 .map_type = BPF_MAP_TYPE_ARRAY,
3938 .map_name = "tag_type_check_btf",
3939 .key_size = sizeof(int),
3944 .btf_load_err = true,
3945 .err_str = "Invalid component_idx",
3948 .descr = "decl_tag test #15, func, invalid func proto",
3950 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3951 BTF_DECL_TAG_ENC(NAME_TBD, 3, 0), /* [2] */
3952 BTF_FUNC_ENC(NAME_TBD, 8), /* [3] */
3955 BTF_STR_SEC("\0tag\0func"),
3956 .map_type = BPF_MAP_TYPE_ARRAY,
3957 .map_name = "tag_type_check_btf",
3958 .key_size = sizeof(int),
3963 .btf_load_err = true,
3964 .err_str = "Invalid type_id",
3967 .descr = "decl_tag test #16, func proto, return type",
3969 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3970 BTF_VAR_ENC(NAME_TBD, 1, 0), /* [2] */
3971 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DECL_TAG, 0, 0), 2), (-1), /* [3] */
3972 BTF_FUNC_PROTO_ENC(3, 0), /* [4] */
3975 BTF_STR_SEC("\0local\0tag1"),
3976 .btf_load_err = true,
3977 .err_str = "Invalid return type",
3980 .descr = "decl_tag test #17, func proto, argument",
3982 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_DECL_TAG, 0, 0), 4), (-1), /* [1] */
3983 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_PTR, 0, 0), 0), /* [2] */
3984 BTF_FUNC_PROTO_ENC(0, 1), /* [3] */
3985 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
3986 BTF_VAR_ENC(NAME_TBD, 2, 0), /* [4] */
3989 BTF_STR_SEC("\0local\0tag1\0var"),
3990 .btf_load_err = true,
3991 .err_str = "Invalid arg#1",
3994 .descr = "decl_tag test #18, decl_tag as the map key type",
3996 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
3997 BTF_STRUCT_ENC(0, 2, 8), /* [2] */
3998 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
3999 BTF_MEMBER_ENC(NAME_TBD, 1, 32),
4000 BTF_DECL_TAG_ENC(NAME_TBD, 2, -1), /* [3] */
4003 BTF_STR_SEC("\0m1\0m2\0tag"),
4004 .map_type = BPF_MAP_TYPE_HASH,
4005 .map_name = "tag_type_check_btf",
4011 .map_create_err = true,
4014 .descr = "decl_tag test #19, decl_tag as the map value type",
4016 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
4017 BTF_STRUCT_ENC(0, 2, 8), /* [2] */
4018 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
4019 BTF_MEMBER_ENC(NAME_TBD, 1, 32),
4020 BTF_DECL_TAG_ENC(NAME_TBD, 2, -1), /* [3] */
4023 BTF_STR_SEC("\0m1\0m2\0tag"),
4024 .map_type = BPF_MAP_TYPE_HASH,
4025 .map_name = "tag_type_check_btf",
4031 .map_create_err = true,
4034 .descr = "type_tag test #1",
4036 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
4037 BTF_TYPE_TAG_ENC(NAME_TBD, 1), /* [2] */
4038 BTF_PTR_ENC(2), /* [3] */
4041 BTF_STR_SEC("\0tag"),
4042 .map_type = BPF_MAP_TYPE_ARRAY,
4043 .map_name = "tag_type_check_btf",
4044 .key_size = sizeof(int),
4051 .descr = "type_tag test #2, type tag order",
4053 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
4054 BTF_CONST_ENC(3), /* [2] */
4055 BTF_TYPE_TAG_ENC(NAME_TBD, 1), /* [3] */
4058 BTF_STR_SEC("\0tag"),
4059 .map_type = BPF_MAP_TYPE_ARRAY,
4060 .map_name = "tag_type_check_btf",
4061 .key_size = sizeof(int),
4066 .btf_load_err = true,
4067 .err_str = "Type tags don't precede modifiers",
4070 .descr = "type_tag test #3, type tag order",
4072 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
4073 BTF_TYPE_TAG_ENC(NAME_TBD, 3), /* [2] */
4074 BTF_CONST_ENC(4), /* [3] */
4075 BTF_TYPE_TAG_ENC(NAME_TBD, 1), /* [4] */
4078 BTF_STR_SEC("\0tag\0tag"),
4079 .map_type = BPF_MAP_TYPE_ARRAY,
4080 .map_name = "tag_type_check_btf",
4081 .key_size = sizeof(int),
4086 .btf_load_err = true,
4087 .err_str = "Type tags don't precede modifiers",
4090 .descr = "type_tag test #4, type tag order",
4092 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
4093 BTF_TYPEDEF_ENC(NAME_TBD, 3), /* [2] */
4094 BTF_CONST_ENC(4), /* [3] */
4095 BTF_TYPE_TAG_ENC(NAME_TBD, 1), /* [4] */
4098 BTF_STR_SEC("\0tag\0tag"),
4099 .map_type = BPF_MAP_TYPE_ARRAY,
4100 .map_name = "tag_type_check_btf",
4101 .key_size = sizeof(int),
4106 .btf_load_err = true,
4107 .err_str = "Type tags don't precede modifiers",
4110 .descr = "type_tag test #5, type tag order",
4112 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
4113 BTF_TYPE_TAG_ENC(NAME_TBD, 3), /* [2] */
4114 BTF_CONST_ENC(1), /* [3] */
4115 BTF_TYPE_TAG_ENC(NAME_TBD, 2), /* [4] */
4118 BTF_STR_SEC("\0tag\0tag"),
4119 .map_type = BPF_MAP_TYPE_ARRAY,
4120 .map_name = "tag_type_check_btf",
4121 .key_size = sizeof(int),
4128 .descr = "type_tag test #6, type tag order",
4130 BTF_PTR_ENC(2), /* [1] */
4131 BTF_TYPE_TAG_ENC(NAME_TBD, 3), /* [2] */
4132 BTF_CONST_ENC(4), /* [3] */
4133 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [4] */
4134 BTF_PTR_ENC(6), /* [5] */
4135 BTF_CONST_ENC(2), /* [6] */
4138 BTF_STR_SEC("\0tag"),
4139 .map_type = BPF_MAP_TYPE_ARRAY,
4140 .map_name = "tag_type_check_btf",
4141 .key_size = sizeof(int),
4146 .btf_load_err = true,
4147 .err_str = "Type tags don't precede modifiers",
4150 .descr = "enum64 test #1, unsigned, size 8",
4152 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
4153 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 2), 8), /* [2] */
4154 BTF_ENUM64_ENC(NAME_TBD, 0, 0),
4155 BTF_ENUM64_ENC(NAME_TBD, 1, 1),
4158 BTF_STR_SEC("\0a\0b\0c"),
4159 .map_type = BPF_MAP_TYPE_ARRAY,
4160 .map_name = "tag_type_check_btf",
4161 .key_size = sizeof(int),
4168 .descr = "enum64 test #2, signed, size 4",
4170 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
4171 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_ENUM64, 1, 2), 4), /* [2] */
4172 BTF_ENUM64_ENC(NAME_TBD, -1, 0),
4173 BTF_ENUM64_ENC(NAME_TBD, 1, 0),
4176 BTF_STR_SEC("\0a\0b\0c"),
4177 .map_type = BPF_MAP_TYPE_ARRAY,
4178 .map_name = "tag_type_check_btf",
4179 .key_size = sizeof(int),
4186 }; /* struct btf_raw_test raw_tests[] */
4188 static const char *get_next_str(const char *start, const char *end)
4190 return start < end - 1 ? start + 1 : NULL;
4193 static int get_raw_sec_size(const __u32 *raw_types)
4197 for (i = MAX_NR_RAW_U32 - 1;
4198 i >= 0 && raw_types[i] != BTF_END_RAW;
4202 return i < 0 ? i : i * sizeof(raw_types[0]);
4205 static void *btf_raw_create(const struct btf_header *hdr,
4206 const __u32 *raw_types,
4208 unsigned int str_sec_size,
4209 unsigned int *btf_size,
4210 const char **ret_next_str)
4212 const char *next_str = str, *end_str = str + str_sec_size;
4213 const char **strs_idx = NULL, **tmp_strs_idx;
4214 int strs_cap = 0, strs_cnt = 0, next_str_idx = 0;
4215 unsigned int size_needed, offset;
4216 struct btf_header *ret_hdr;
4217 int i, type_sec_size, err = 0;
4218 uint32_t *ret_types;
4219 void *raw_btf = NULL;
4221 type_sec_size = get_raw_sec_size(raw_types);
4222 if (CHECK(type_sec_size < 0, "Cannot get nr_raw_types"))
4225 size_needed = sizeof(*hdr) + type_sec_size + str_sec_size;
4226 raw_btf = malloc(size_needed);
4227 if (CHECK(!raw_btf, "Cannot allocate memory for raw_btf"))
4231 memcpy(raw_btf, hdr, sizeof(*hdr));
4232 offset = sizeof(*hdr);
4235 while ((next_str = get_next_str(next_str, end_str))) {
4236 if (strs_cnt == strs_cap) {
4237 strs_cap += max(16, strs_cap / 2);
4238 tmp_strs_idx = realloc(strs_idx,
4239 sizeof(*strs_idx) * strs_cap);
4240 if (CHECK(!tmp_strs_idx,
4241 "Cannot allocate memory for strs_idx")) {
4245 strs_idx = tmp_strs_idx;
4247 strs_idx[strs_cnt++] = next_str;
4248 next_str += strlen(next_str);
4251 /* Copy type section */
4252 ret_types = raw_btf + offset;
4253 for (i = 0; i < type_sec_size / sizeof(raw_types[0]); i++) {
4254 if (raw_types[i] == NAME_TBD) {
4255 if (CHECK(next_str_idx == strs_cnt,
4256 "Error in getting next_str #%d",
4261 ret_types[i] = strs_idx[next_str_idx++] - str;
4262 } else if (IS_NAME_NTH(raw_types[i])) {
4263 int idx = GET_NAME_NTH_IDX(raw_types[i]);
4265 if (CHECK(idx <= 0 || idx > strs_cnt,
4266 "Error getting string #%d, strs_cnt:%d",
4271 ret_types[i] = strs_idx[idx-1] - str;
4273 ret_types[i] = raw_types[i];
4276 offset += type_sec_size;
4278 /* Copy string section */
4279 memcpy(raw_btf + offset, str, str_sec_size);
4281 ret_hdr = (struct btf_header *)raw_btf;
4282 ret_hdr->type_len = type_sec_size;
4283 ret_hdr->str_off = type_sec_size;
4284 ret_hdr->str_len = str_sec_size;
4286 *btf_size = size_needed;
4289 next_str_idx < strs_cnt ? strs_idx[next_str_idx] : NULL;
4300 static int load_raw_btf(const void *raw_data, size_t raw_size)
4302 LIBBPF_OPTS(bpf_btf_load_opts, opts);
4306 opts.log_buf = btf_log_buf,
4307 opts.log_size = BTF_LOG_BUF_SIZE,
4311 btf_fd = bpf_btf_load(raw_data, raw_size, &opts);
4312 if (btf_fd < 0 && !always_log) {
4313 opts.log_buf = btf_log_buf,
4314 opts.log_size = BTF_LOG_BUF_SIZE,
4316 btf_fd = bpf_btf_load(raw_data, raw_size, &opts);
4322 static void do_test_raw(unsigned int test_num)
4324 struct btf_raw_test *test = &raw_tests[test_num - 1];
4325 LIBBPF_OPTS(bpf_map_create_opts, opts);
4326 int map_fd = -1, btf_fd = -1;
4327 unsigned int raw_btf_size;
4328 struct btf_header *hdr;
4332 if (!test__start_subtest(test->descr))
4335 raw_btf = btf_raw_create(&hdr_tmpl,
4339 &raw_btf_size, NULL);
4345 hdr->hdr_len = (int)hdr->hdr_len + test->hdr_len_delta;
4346 hdr->type_off = (int)hdr->type_off + test->type_off_delta;
4347 hdr->str_off = (int)hdr->str_off + test->str_off_delta;
4348 hdr->str_len = (int)hdr->str_len + test->str_len_delta;
4350 *btf_log_buf = '\0';
4351 btf_fd = load_raw_btf(raw_btf, raw_btf_size);
4354 err = ((btf_fd < 0) != test->btf_load_err);
4355 if (CHECK(err, "btf_fd:%d test->btf_load_err:%u",
4356 btf_fd, test->btf_load_err) ||
4357 CHECK(test->err_str && !strstr(btf_log_buf, test->err_str),
4358 "expected err_str:%s\n", test->err_str)) {
4363 if (err || btf_fd < 0)
4366 opts.btf_fd = btf_fd;
4367 opts.btf_key_type_id = test->key_type_id;
4368 opts.btf_value_type_id = test->value_type_id;
4369 map_fd = bpf_map_create(test->map_type, test->map_name,
4370 test->key_size, test->value_size, test->max_entries, &opts);
4372 err = ((map_fd < 0) != test->map_create_err);
4373 CHECK(err, "map_fd:%d test->map_create_err:%u",
4374 map_fd, test->map_create_err);
4377 if (*btf_log_buf && (err || always_log))
4378 fprintf(stderr, "\n%s", btf_log_buf);
4385 struct btf_get_info_test {
4387 const char *str_sec;
4388 __u32 raw_types[MAX_NR_RAW_U32];
4391 int (*special_test)(unsigned int test_num);
4394 static int test_big_btf_info(unsigned int test_num);
4395 static int test_btf_id(unsigned int test_num);
4397 const struct btf_get_info_test get_info_tests[] = {
4399 .descr = "== raw_btf_size+1",
4402 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
4406 .str_sec_size = sizeof(""),
4407 .btf_size_delta = 1,
4410 .descr = "== raw_btf_size-3",
4413 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
4417 .str_sec_size = sizeof(""),
4418 .btf_size_delta = -3,
4421 .descr = "Large bpf_btf_info",
4424 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
4428 .str_sec_size = sizeof(""),
4429 .special_test = test_big_btf_info,
4435 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4),
4436 /* unsigned int */ /* [2] */
4437 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4),
4441 .str_sec_size = sizeof(""),
4442 .special_test = test_btf_id,
4446 static int test_big_btf_info(unsigned int test_num)
4448 const struct btf_get_info_test *test = &get_info_tests[test_num - 1];
4449 uint8_t *raw_btf = NULL, *user_btf = NULL;
4450 unsigned int raw_btf_size;
4452 struct bpf_btf_info info;
4455 struct bpf_btf_info *info;
4456 int btf_fd = -1, err;
4459 raw_btf = btf_raw_create(&hdr_tmpl,
4463 &raw_btf_size, NULL);
4468 *btf_log_buf = '\0';
4470 user_btf = malloc(raw_btf_size);
4471 if (CHECK(!user_btf, "!user_btf")) {
4476 btf_fd = load_raw_btf(raw_btf, raw_btf_size);
4477 if (CHECK(btf_fd < 0, "errno:%d", errno)) {
4483 * GET_INFO should error out if the userspace info
4484 * has non zero tailing bytes.
4486 info = &info_garbage.info;
4487 memset(info, 0, sizeof(*info));
4488 info_garbage.garbage = 0xdeadbeef;
4489 info_len = sizeof(info_garbage);
4490 info->btf = ptr_to_u64(user_btf);
4491 info->btf_size = raw_btf_size;
4493 err = bpf_btf_get_info_by_fd(btf_fd, info, &info_len);
4494 if (CHECK(!err, "!err")) {
4500 * GET_INFO should succeed even info_len is larger than
4501 * the kernel supported as long as tailing bytes are zero.
4502 * The kernel supported info len should also be returned
4505 info_garbage.garbage = 0;
4506 err = bpf_btf_get_info_by_fd(btf_fd, info, &info_len);
4507 if (CHECK(err || info_len != sizeof(*info),
4508 "err:%d errno:%d info_len:%u sizeof(*info):%zu",
4509 err, errno, info_len, sizeof(*info))) {
4514 fprintf(stderr, "OK");
4517 if (*btf_log_buf && (err || always_log))
4518 fprintf(stderr, "\n%s", btf_log_buf);
4529 static int test_btf_id(unsigned int test_num)
4531 const struct btf_get_info_test *test = &get_info_tests[test_num - 1];
4532 LIBBPF_OPTS(bpf_map_create_opts, opts);
4533 uint8_t *raw_btf = NULL, *user_btf[2] = {};
4534 int btf_fd[2] = {-1, -1}, map_fd = -1;
4535 struct bpf_map_info map_info = {};
4536 struct bpf_btf_info info[2] = {};
4537 unsigned int raw_btf_size;
4541 raw_btf = btf_raw_create(&hdr_tmpl,
4545 &raw_btf_size, NULL);
4550 *btf_log_buf = '\0';
4552 for (i = 0; i < 2; i++) {
4553 user_btf[i] = malloc(raw_btf_size);
4554 if (CHECK(!user_btf[i], "!user_btf[%d]", i)) {
4558 info[i].btf = ptr_to_u64(user_btf[i]);
4559 info[i].btf_size = raw_btf_size;
4562 btf_fd[0] = load_raw_btf(raw_btf, raw_btf_size);
4563 if (CHECK(btf_fd[0] < 0, "errno:%d", errno)) {
4568 /* Test BPF_OBJ_GET_INFO_BY_ID on btf_id */
4569 info_len = sizeof(info[0]);
4570 err = bpf_btf_get_info_by_fd(btf_fd[0], &info[0], &info_len);
4571 if (CHECK(err, "errno:%d", errno)) {
4576 btf_fd[1] = bpf_btf_get_fd_by_id(info[0].id);
4577 if (CHECK(btf_fd[1] < 0, "errno:%d", errno)) {
4583 err = bpf_btf_get_info_by_fd(btf_fd[1], &info[1], &info_len);
4584 if (CHECK(err || info[0].id != info[1].id ||
4585 info[0].btf_size != info[1].btf_size ||
4586 (ret = memcmp(user_btf[0], user_btf[1], info[0].btf_size)),
4587 "err:%d errno:%d id0:%u id1:%u btf_size0:%u btf_size1:%u memcmp:%d",
4588 err, errno, info[0].id, info[1].id,
4589 info[0].btf_size, info[1].btf_size, ret)) {
4594 /* Test btf members in struct bpf_map_info */
4595 opts.btf_fd = btf_fd[0];
4596 opts.btf_key_type_id = 1;
4597 opts.btf_value_type_id = 2;
4598 map_fd = bpf_map_create(BPF_MAP_TYPE_ARRAY, "test_btf_id",
4599 sizeof(int), sizeof(int), 4, &opts);
4600 if (CHECK(map_fd < 0, "errno:%d", errno)) {
4605 info_len = sizeof(map_info);
4606 err = bpf_map_get_info_by_fd(map_fd, &map_info, &info_len);
4607 if (CHECK(err || map_info.btf_id != info[0].id ||
4608 map_info.btf_key_type_id != 1 || map_info.btf_value_type_id != 2,
4609 "err:%d errno:%d info.id:%u btf_id:%u btf_key_type_id:%u btf_value_type_id:%u",
4610 err, errno, info[0].id, map_info.btf_id, map_info.btf_key_type_id,
4611 map_info.btf_value_type_id)) {
4616 for (i = 0; i < 2; i++) {
4621 /* Test BTF ID is removed from the kernel */
4622 btf_fd[0] = bpf_btf_get_fd_by_id(map_info.btf_id);
4623 if (CHECK(btf_fd[0] < 0, "errno:%d", errno)) {
4630 /* The map holds the last ref to BTF and its btf_id */
4633 btf_fd[0] = bpf_btf_get_fd_by_id(map_info.btf_id);
4634 if (CHECK(btf_fd[0] >= 0, "BTF lingers")) {
4639 fprintf(stderr, "OK");
4642 if (*btf_log_buf && (err || always_log))
4643 fprintf(stderr, "\n%s", btf_log_buf);
4648 for (i = 0; i < 2; i++) {
4657 static void do_test_get_info(unsigned int test_num)
4659 const struct btf_get_info_test *test = &get_info_tests[test_num - 1];
4660 unsigned int raw_btf_size, user_btf_size, expected_nbytes;
4661 uint8_t *raw_btf = NULL, *user_btf = NULL;
4662 struct bpf_btf_info info = {};
4663 int btf_fd = -1, err, ret;
4666 if (!test__start_subtest(test->descr))
4669 if (test->special_test) {
4670 err = test->special_test(test_num);
4671 if (CHECK(err, "failed: %d\n", err))
4675 raw_btf = btf_raw_create(&hdr_tmpl,
4679 &raw_btf_size, NULL);
4684 *btf_log_buf = '\0';
4686 user_btf = malloc(raw_btf_size);
4687 if (CHECK(!user_btf, "!user_btf")) {
4692 btf_fd = load_raw_btf(raw_btf, raw_btf_size);
4693 if (CHECK(btf_fd <= 0, "errno:%d", errno)) {
4698 user_btf_size = (int)raw_btf_size + test->btf_size_delta;
4699 expected_nbytes = min(raw_btf_size, user_btf_size);
4700 if (raw_btf_size > expected_nbytes)
4701 memset(user_btf + expected_nbytes, 0xff,
4702 raw_btf_size - expected_nbytes);
4704 info_len = sizeof(info);
4705 info.btf = ptr_to_u64(user_btf);
4706 info.btf_size = user_btf_size;
4709 err = bpf_btf_get_info_by_fd(btf_fd, &info, &info_len);
4710 if (CHECK(err || !info.id || info_len != sizeof(info) ||
4711 info.btf_size != raw_btf_size ||
4712 (ret = memcmp(raw_btf, user_btf, expected_nbytes)),
4713 "err:%d errno:%d info.id:%u info_len:%u sizeof(info):%zu raw_btf_size:%u info.btf_size:%u expected_nbytes:%u memcmp:%d",
4714 err, errno, info.id, info_len, sizeof(info),
4715 raw_btf_size, info.btf_size, expected_nbytes, ret)) {
4720 while (expected_nbytes < raw_btf_size) {
4721 fprintf(stderr, "%u...", expected_nbytes);
4722 if (CHECK(user_btf[expected_nbytes++] != 0xff,
4723 "user_btf[%u]:%x != 0xff", expected_nbytes - 1,
4724 user_btf[expected_nbytes - 1])) {
4730 fprintf(stderr, "OK");
4733 if (*btf_log_buf && (err || always_log))
4734 fprintf(stderr, "\n%s", btf_log_buf);
4743 struct btf_file_test {
4745 bool btf_kv_notfound;
4748 static struct btf_file_test file_tests[] = {
4749 { .file = "test_btf_newkv.bpf.o", },
4750 { .file = "test_btf_nokv.bpf.o", .btf_kv_notfound = true, },
4753 static void do_test_file(unsigned int test_num)
4755 const struct btf_file_test *test = &file_tests[test_num - 1];
4756 const char *expected_fnames[] = {"_dummy_tracepoint",
4757 "test_long_fname_1",
4758 "test_long_fname_2"};
4759 struct btf_ext *btf_ext = NULL;
4760 struct bpf_prog_info info = {};
4761 struct bpf_object *obj = NULL;
4762 struct bpf_func_info *finfo;
4763 struct bpf_program *prog;
4764 __u32 info_len, rec_size;
4765 bool has_btf_ext = false;
4766 struct btf *btf = NULL;
4767 void *func_info = NULL;
4768 struct bpf_map *map;
4769 int i, err, prog_fd;
4771 if (!test__start_subtest(test->file))
4774 btf = btf__parse_elf(test->file, &btf_ext);
4775 err = libbpf_get_error(btf);
4777 if (err == -ENOENT) {
4778 printf("%s:SKIP: No ELF %s found", __func__, BTF_ELF_SEC);
4786 has_btf_ext = btf_ext != NULL;
4787 btf_ext__free(btf_ext);
4789 /* temporary disable LIBBPF_STRICT_MAP_DEFINITIONS to test legacy maps */
4790 libbpf_set_strict_mode(LIBBPF_STRICT_ALL & ~LIBBPF_STRICT_MAP_DEFINITIONS);
4791 obj = bpf_object__open(test->file);
4792 err = libbpf_get_error(obj);
4793 if (CHECK(err, "obj: %d", err))
4796 prog = bpf_object__next_program(obj, NULL);
4797 if (CHECK(!prog, "Cannot find bpf_prog")) {
4802 bpf_program__set_type(prog, BPF_PROG_TYPE_TRACEPOINT);
4803 err = bpf_object__load(obj);
4804 if (CHECK(err < 0, "bpf_object__load: %d", err))
4806 prog_fd = bpf_program__fd(prog);
4808 map = bpf_object__find_map_by_name(obj, "btf_map");
4809 if (CHECK(!map, "btf_map not found")) {
4814 err = (bpf_map__btf_key_type_id(map) == 0 || bpf_map__btf_value_type_id(map) == 0)
4815 != test->btf_kv_notfound;
4816 if (CHECK(err, "btf_key_type_id:%u btf_value_type_id:%u test->btf_kv_notfound:%u",
4817 bpf_map__btf_key_type_id(map), bpf_map__btf_value_type_id(map),
4818 test->btf_kv_notfound))
4824 /* get necessary program info */
4825 info_len = sizeof(struct bpf_prog_info);
4826 err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len);
4828 if (CHECK(err < 0, "invalid get info (1st) errno:%d", errno)) {
4829 fprintf(stderr, "%s\n", btf_log_buf);
4833 if (CHECK(info.nr_func_info != 3,
4834 "incorrect info.nr_func_info (1st) %d",
4835 info.nr_func_info)) {
4839 rec_size = info.func_info_rec_size;
4840 if (CHECK(rec_size != sizeof(struct bpf_func_info),
4841 "incorrect info.func_info_rec_size (1st) %d\n", rec_size)) {
4846 func_info = malloc(info.nr_func_info * rec_size);
4847 if (CHECK(!func_info, "out of memory")) {
4852 /* reset info to only retrieve func_info related data */
4853 memset(&info, 0, sizeof(info));
4854 info.nr_func_info = 3;
4855 info.func_info_rec_size = rec_size;
4856 info.func_info = ptr_to_u64(func_info);
4858 err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len);
4860 if (CHECK(err < 0, "invalid get info (2nd) errno:%d", errno)) {
4861 fprintf(stderr, "%s\n", btf_log_buf);
4865 if (CHECK(info.nr_func_info != 3,
4866 "incorrect info.nr_func_info (2nd) %d",
4867 info.nr_func_info)) {
4871 if (CHECK(info.func_info_rec_size != rec_size,
4872 "incorrect info.func_info_rec_size (2nd) %d",
4873 info.func_info_rec_size)) {
4878 btf = btf__load_from_kernel_by_id(info.btf_id);
4879 err = libbpf_get_error(btf);
4880 if (CHECK(err, "cannot get btf from kernel, err: %d", err))
4883 /* check three functions */
4885 for (i = 0; i < 3; i++) {
4886 const struct btf_type *t;
4889 t = btf__type_by_id(btf, finfo->type_id);
4890 if (CHECK(!t, "btf__type_by_id failure: id %u",
4896 fname = btf__name_by_offset(btf, t->name_off);
4897 err = strcmp(fname, expected_fnames[i]);
4898 /* for the second and third functions in .text section,
4899 * the compiler may order them either way.
4902 err = strcmp(fname, expected_fnames[3 - i]);
4903 if (CHECK(err, "incorrect fname %s", fname ? : "")) {
4908 finfo = (void *)finfo + rec_size;
4912 fprintf(stderr, "OK");
4915 libbpf_set_strict_mode(LIBBPF_STRICT_ALL);
4919 bpf_object__close(obj);
4922 const char *pprint_enum_str[] = {
4929 struct pprint_mapv {
4934 uint32_t unused_bits2a:2,
4949 uint8_t si8_4[2][2];
4952 #ifdef __SIZEOF_INT128__
4953 struct pprint_mapv_int128 {
4956 unsigned __int128 bits3:3;
4957 unsigned __int128 bits80:80;
4958 unsigned __int128 ui128;
4962 static struct btf_raw_test pprint_test_template[] = {
4965 /* unsighed char */ /* [1] */
4966 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 8, 1),
4967 /* unsigned short */ /* [2] */
4968 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 16, 2),
4969 /* unsigned int */ /* [3] */
4970 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 32, 4),
4972 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
4973 /* unsigned long long */ /* [5] */
4974 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 64, 8),
4975 /* 2 bits */ /* [6] */
4976 BTF_TYPE_INT_ENC(0, 0, 0, 2, 2),
4977 /* 28 bits */ /* [7] */
4978 BTF_TYPE_INT_ENC(0, 0, 0, 28, 4),
4979 /* uint8_t[8] */ /* [8] */
4980 BTF_TYPE_ARRAY_ENC(9, 1, 8),
4981 /* typedef unsigned char uint8_t */ /* [9] */
4982 BTF_TYPEDEF_ENC(NAME_TBD, 1),
4983 /* typedef unsigned short uint16_t */ /* [10] */
4984 BTF_TYPEDEF_ENC(NAME_TBD, 2),
4985 /* typedef unsigned int uint32_t */ /* [11] */
4986 BTF_TYPEDEF_ENC(NAME_TBD, 3),
4987 /* typedef int int32_t */ /* [12] */
4988 BTF_TYPEDEF_ENC(NAME_TBD, 4),
4989 /* typedef unsigned long long uint64_t *//* [13] */
4990 BTF_TYPEDEF_ENC(NAME_TBD, 5),
4991 /* union (anon) */ /* [14] */
4992 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_UNION, 0, 2), 8),
4993 BTF_MEMBER_ENC(NAME_TBD, 13, 0),/* uint64_t ui64; */
4994 BTF_MEMBER_ENC(NAME_TBD, 8, 0), /* uint8_t ui8a[8]; */
4995 /* enum (anon) */ /* [15] */
4996 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_ENUM, 0, 4), 4),
4997 BTF_ENUM_ENC(NAME_TBD, 0),
4998 BTF_ENUM_ENC(NAME_TBD, 1),
4999 BTF_ENUM_ENC(NAME_TBD, 2),
5000 BTF_ENUM_ENC(NAME_TBD, 3),
5001 /* struct pprint_mapv */ /* [16] */
5002 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 0, 11), 40),
5003 BTF_MEMBER_ENC(NAME_TBD, 11, 0), /* uint32_t ui32 */
5004 BTF_MEMBER_ENC(NAME_TBD, 10, 32), /* uint16_t ui16 */
5005 BTF_MEMBER_ENC(NAME_TBD, 12, 64), /* int32_t si32 */
5006 BTF_MEMBER_ENC(NAME_TBD, 6, 96), /* unused_bits2a */
5007 BTF_MEMBER_ENC(NAME_TBD, 7, 98), /* bits28 */
5008 BTF_MEMBER_ENC(NAME_TBD, 6, 126), /* unused_bits2b */
5009 BTF_MEMBER_ENC(0, 14, 128), /* union (anon) */
5010 BTF_MEMBER_ENC(NAME_TBD, 15, 192), /* aenum */
5011 BTF_MEMBER_ENC(NAME_TBD, 11, 224), /* uint32_t ui32b */
5012 BTF_MEMBER_ENC(NAME_TBD, 6, 256), /* bits2c */
5013 BTF_MEMBER_ENC(NAME_TBD, 17, 264), /* si8_4 */
5014 BTF_TYPE_ARRAY_ENC(18, 1, 2), /* [17] */
5015 BTF_TYPE_ARRAY_ENC(1, 1, 2), /* [18] */
5018 BTF_STR_SEC("\0unsigned char\0unsigned short\0unsigned int\0int\0unsigned long long\0uint8_t\0uint16_t\0uint32_t\0int32_t\0uint64_t\0ui64\0ui8a\0ENUM_ZERO\0ENUM_ONE\0ENUM_TWO\0ENUM_THREE\0pprint_mapv\0ui32\0ui16\0si32\0unused_bits2a\0bits28\0unused_bits2b\0aenum\0ui32b\0bits2c\0si8_4"),
5019 .key_size = sizeof(unsigned int),
5020 .value_size = sizeof(struct pprint_mapv),
5021 .key_type_id = 3, /* unsigned int */
5022 .value_type_id = 16, /* struct pprint_mapv */
5027 /* this type will have the same type as the
5028 * first .raw_types definition, but struct type will
5029 * be encoded with kind_flag set.
5032 /* unsighed char */ /* [1] */
5033 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 8, 1),
5034 /* unsigned short */ /* [2] */
5035 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 16, 2),
5036 /* unsigned int */ /* [3] */
5037 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 32, 4),
5039 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
5040 /* unsigned long long */ /* [5] */
5041 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 64, 8),
5042 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [6] */
5043 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [7] */
5044 /* uint8_t[8] */ /* [8] */
5045 BTF_TYPE_ARRAY_ENC(9, 1, 8),
5046 /* typedef unsigned char uint8_t */ /* [9] */
5047 BTF_TYPEDEF_ENC(NAME_TBD, 1),
5048 /* typedef unsigned short uint16_t */ /* [10] */
5049 BTF_TYPEDEF_ENC(NAME_TBD, 2),
5050 /* typedef unsigned int uint32_t */ /* [11] */
5051 BTF_TYPEDEF_ENC(NAME_TBD, 3),
5052 /* typedef int int32_t */ /* [12] */
5053 BTF_TYPEDEF_ENC(NAME_TBD, 4),
5054 /* typedef unsigned long long uint64_t *//* [13] */
5055 BTF_TYPEDEF_ENC(NAME_TBD, 5),
5056 /* union (anon) */ /* [14] */
5057 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_UNION, 0, 2), 8),
5058 BTF_MEMBER_ENC(NAME_TBD, 13, 0),/* uint64_t ui64; */
5059 BTF_MEMBER_ENC(NAME_TBD, 8, 0), /* uint8_t ui8a[8]; */
5060 /* enum (anon) */ /* [15] */
5061 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_ENUM, 0, 4), 4),
5062 BTF_ENUM_ENC(NAME_TBD, 0),
5063 BTF_ENUM_ENC(NAME_TBD, 1),
5064 BTF_ENUM_ENC(NAME_TBD, 2),
5065 BTF_ENUM_ENC(NAME_TBD, 3),
5066 /* struct pprint_mapv */ /* [16] */
5067 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 11), 40),
5068 BTF_MEMBER_ENC(NAME_TBD, 11, BTF_MEMBER_OFFSET(0, 0)), /* uint32_t ui32 */
5069 BTF_MEMBER_ENC(NAME_TBD, 10, BTF_MEMBER_OFFSET(0, 32)), /* uint16_t ui16 */
5070 BTF_MEMBER_ENC(NAME_TBD, 12, BTF_MEMBER_OFFSET(0, 64)), /* int32_t si32 */
5071 BTF_MEMBER_ENC(NAME_TBD, 6, BTF_MEMBER_OFFSET(2, 96)), /* unused_bits2a */
5072 BTF_MEMBER_ENC(NAME_TBD, 7, BTF_MEMBER_OFFSET(28, 98)), /* bits28 */
5073 BTF_MEMBER_ENC(NAME_TBD, 6, BTF_MEMBER_OFFSET(2, 126)), /* unused_bits2b */
5074 BTF_MEMBER_ENC(0, 14, BTF_MEMBER_OFFSET(0, 128)), /* union (anon) */
5075 BTF_MEMBER_ENC(NAME_TBD, 15, BTF_MEMBER_OFFSET(0, 192)), /* aenum */
5076 BTF_MEMBER_ENC(NAME_TBD, 11, BTF_MEMBER_OFFSET(0, 224)), /* uint32_t ui32b */
5077 BTF_MEMBER_ENC(NAME_TBD, 6, BTF_MEMBER_OFFSET(2, 256)), /* bits2c */
5078 BTF_MEMBER_ENC(NAME_TBD, 17, 264), /* si8_4 */
5079 BTF_TYPE_ARRAY_ENC(18, 1, 2), /* [17] */
5080 BTF_TYPE_ARRAY_ENC(1, 1, 2), /* [18] */
5083 BTF_STR_SEC("\0unsigned char\0unsigned short\0unsigned int\0int\0unsigned long long\0uint8_t\0uint16_t\0uint32_t\0int32_t\0uint64_t\0ui64\0ui8a\0ENUM_ZERO\0ENUM_ONE\0ENUM_TWO\0ENUM_THREE\0pprint_mapv\0ui32\0ui16\0si32\0unused_bits2a\0bits28\0unused_bits2b\0aenum\0ui32b\0bits2c\0si8_4"),
5084 .key_size = sizeof(unsigned int),
5085 .value_size = sizeof(struct pprint_mapv),
5086 .key_type_id = 3, /* unsigned int */
5087 .value_type_id = 16, /* struct pprint_mapv */
5092 /* this type will have the same layout as the
5093 * first .raw_types definition. The struct type will
5094 * be encoded with kind_flag set, bitfield members
5095 * are added typedef/const/volatile, and bitfield members
5096 * will have both int and enum types.
5099 /* unsighed char */ /* [1] */
5100 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 8, 1),
5101 /* unsigned short */ /* [2] */
5102 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 16, 2),
5103 /* unsigned int */ /* [3] */
5104 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 32, 4),
5106 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4),
5107 /* unsigned long long */ /* [5] */
5108 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 64, 8),
5109 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [6] */
5110 BTF_TYPE_INT_ENC(0, 0, 0, 32, 4), /* [7] */
5111 /* uint8_t[8] */ /* [8] */
5112 BTF_TYPE_ARRAY_ENC(9, 1, 8),
5113 /* typedef unsigned char uint8_t */ /* [9] */
5114 BTF_TYPEDEF_ENC(NAME_TBD, 1),
5115 /* typedef unsigned short uint16_t */ /* [10] */
5116 BTF_TYPEDEF_ENC(NAME_TBD, 2),
5117 /* typedef unsigned int uint32_t */ /* [11] */
5118 BTF_TYPEDEF_ENC(NAME_TBD, 3),
5119 /* typedef int int32_t */ /* [12] */
5120 BTF_TYPEDEF_ENC(NAME_TBD, 4),
5121 /* typedef unsigned long long uint64_t *//* [13] */
5122 BTF_TYPEDEF_ENC(NAME_TBD, 5),
5123 /* union (anon) */ /* [14] */
5124 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_UNION, 0, 2), 8),
5125 BTF_MEMBER_ENC(NAME_TBD, 13, 0),/* uint64_t ui64; */
5126 BTF_MEMBER_ENC(NAME_TBD, 8, 0), /* uint8_t ui8a[8]; */
5127 /* enum (anon) */ /* [15] */
5128 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_ENUM, 0, 4), 4),
5129 BTF_ENUM_ENC(NAME_TBD, 0),
5130 BTF_ENUM_ENC(NAME_TBD, 1),
5131 BTF_ENUM_ENC(NAME_TBD, 2),
5132 BTF_ENUM_ENC(NAME_TBD, 3),
5133 /* struct pprint_mapv */ /* [16] */
5134 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 11), 40),
5135 BTF_MEMBER_ENC(NAME_TBD, 11, BTF_MEMBER_OFFSET(0, 0)), /* uint32_t ui32 */
5136 BTF_MEMBER_ENC(NAME_TBD, 10, BTF_MEMBER_OFFSET(0, 32)), /* uint16_t ui16 */
5137 BTF_MEMBER_ENC(NAME_TBD, 12, BTF_MEMBER_OFFSET(0, 64)), /* int32_t si32 */
5138 BTF_MEMBER_ENC(NAME_TBD, 17, BTF_MEMBER_OFFSET(2, 96)), /* unused_bits2a */
5139 BTF_MEMBER_ENC(NAME_TBD, 7, BTF_MEMBER_OFFSET(28, 98)), /* bits28 */
5140 BTF_MEMBER_ENC(NAME_TBD, 19, BTF_MEMBER_OFFSET(2, 126)),/* unused_bits2b */
5141 BTF_MEMBER_ENC(0, 14, BTF_MEMBER_OFFSET(0, 128)), /* union (anon) */
5142 BTF_MEMBER_ENC(NAME_TBD, 15, BTF_MEMBER_OFFSET(0, 192)), /* aenum */
5143 BTF_MEMBER_ENC(NAME_TBD, 11, BTF_MEMBER_OFFSET(0, 224)), /* uint32_t ui32b */
5144 BTF_MEMBER_ENC(NAME_TBD, 17, BTF_MEMBER_OFFSET(2, 256)), /* bits2c */
5145 BTF_MEMBER_ENC(NAME_TBD, 20, BTF_MEMBER_OFFSET(0, 264)), /* si8_4 */
5146 /* typedef unsigned int ___int */ /* [17] */
5147 BTF_TYPEDEF_ENC(NAME_TBD, 18),
5148 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_VOLATILE, 0, 0), 6), /* [18] */
5149 BTF_TYPE_ENC(0, BTF_INFO_ENC(BTF_KIND_CONST, 0, 0), 15), /* [19] */
5150 BTF_TYPE_ARRAY_ENC(21, 1, 2), /* [20] */
5151 BTF_TYPE_ARRAY_ENC(1, 1, 2), /* [21] */
5154 BTF_STR_SEC("\0unsigned char\0unsigned short\0unsigned int\0int\0unsigned long long\0uint8_t\0uint16_t\0uint32_t\0int32_t\0uint64_t\0ui64\0ui8a\0ENUM_ZERO\0ENUM_ONE\0ENUM_TWO\0ENUM_THREE\0pprint_mapv\0ui32\0ui16\0si32\0unused_bits2a\0bits28\0unused_bits2b\0aenum\0ui32b\0bits2c\0___int\0si8_4"),
5155 .key_size = sizeof(unsigned int),
5156 .value_size = sizeof(struct pprint_mapv),
5157 .key_type_id = 3, /* unsigned int */
5158 .value_type_id = 16, /* struct pprint_mapv */
5162 #ifdef __SIZEOF_INT128__
5166 /* unsigned int */ /* [1] */
5167 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 32, 4),
5168 /* __int128 */ /* [2] */
5169 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 128, 16),
5170 /* unsigned __int128 */ /* [3] */
5171 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 128, 16),
5172 /* struct pprint_mapv_int128 */ /* [4] */
5173 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 5), 64),
5174 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(0, 0)), /* si128a */
5175 BTF_MEMBER_ENC(NAME_TBD, 2, BTF_MEMBER_OFFSET(0, 128)), /* si128b */
5176 BTF_MEMBER_ENC(NAME_TBD, 3, BTF_MEMBER_OFFSET(3, 256)), /* bits3 */
5177 BTF_MEMBER_ENC(NAME_TBD, 3, BTF_MEMBER_OFFSET(80, 259)), /* bits80 */
5178 BTF_MEMBER_ENC(NAME_TBD, 3, BTF_MEMBER_OFFSET(0, 384)), /* ui128 */
5181 BTF_STR_SEC("\0unsigned int\0__int128\0unsigned __int128\0pprint_mapv_int128\0si128a\0si128b\0bits3\0bits80\0ui128"),
5182 .key_size = sizeof(unsigned int),
5183 .value_size = sizeof(struct pprint_mapv_int128),
5187 .mapv_kind = PPRINT_MAPV_KIND_INT128,
5193 static struct btf_pprint_test_meta {
5195 enum bpf_map_type map_type;
5196 const char *map_name;
5200 } pprint_tests_meta[] = {
5202 .descr = "BTF pretty print array",
5203 .map_type = BPF_MAP_TYPE_ARRAY,
5204 .map_name = "pprint_test_array",
5205 .ordered_map = true,
5206 .lossless_map = true,
5207 .percpu_map = false,
5211 .descr = "BTF pretty print hash",
5212 .map_type = BPF_MAP_TYPE_HASH,
5213 .map_name = "pprint_test_hash",
5214 .ordered_map = false,
5215 .lossless_map = true,
5216 .percpu_map = false,
5220 .descr = "BTF pretty print lru hash",
5221 .map_type = BPF_MAP_TYPE_LRU_HASH,
5222 .map_name = "pprint_test_lru_hash",
5223 .ordered_map = false,
5224 .lossless_map = false,
5225 .percpu_map = false,
5229 .descr = "BTF pretty print percpu array",
5230 .map_type = BPF_MAP_TYPE_PERCPU_ARRAY,
5231 .map_name = "pprint_test_percpu_array",
5232 .ordered_map = true,
5233 .lossless_map = true,
5238 .descr = "BTF pretty print percpu hash",
5239 .map_type = BPF_MAP_TYPE_PERCPU_HASH,
5240 .map_name = "pprint_test_percpu_hash",
5241 .ordered_map = false,
5242 .lossless_map = true,
5247 .descr = "BTF pretty print lru percpu hash",
5248 .map_type = BPF_MAP_TYPE_LRU_PERCPU_HASH,
5249 .map_name = "pprint_test_lru_percpu_hash",
5250 .ordered_map = false,
5251 .lossless_map = false,
5257 static size_t get_pprint_mapv_size(enum pprint_mapv_kind_t mapv_kind)
5259 if (mapv_kind == PPRINT_MAPV_KIND_BASIC)
5260 return sizeof(struct pprint_mapv);
5262 #ifdef __SIZEOF_INT128__
5263 if (mapv_kind == PPRINT_MAPV_KIND_INT128)
5264 return sizeof(struct pprint_mapv_int128);
5271 static void set_pprint_mapv(enum pprint_mapv_kind_t mapv_kind,
5272 void *mapv, uint32_t i,
5273 int num_cpus, int rounded_value_size)
5277 if (mapv_kind == PPRINT_MAPV_KIND_BASIC) {
5278 struct pprint_mapv *v = mapv;
5280 for (cpu = 0; cpu < num_cpus; cpu++) {
5283 v->unused_bits2a = 3;
5285 v->unused_bits2b = 3;
5287 v->aenum = i & 0x03;
5290 v->si8_4[0][0] = (cpu + i) & 0xff;
5291 v->si8_4[0][1] = (cpu + i + 1) & 0xff;
5292 v->si8_4[1][0] = (cpu + i + 2) & 0xff;
5293 v->si8_4[1][1] = (cpu + i + 3) & 0xff;
5294 v = (void *)v + rounded_value_size;
5298 #ifdef __SIZEOF_INT128__
5299 if (mapv_kind == PPRINT_MAPV_KIND_INT128) {
5300 struct pprint_mapv_int128 *v = mapv;
5302 for (cpu = 0; cpu < num_cpus; cpu++) {
5305 v->bits3 = i & 0x07;
5306 v->bits80 = (((unsigned __int128)1) << 64) + i;
5307 v->ui128 = (((unsigned __int128)2) << 64) + i;
5308 v = (void *)v + rounded_value_size;
5314 ssize_t get_pprint_expected_line(enum pprint_mapv_kind_t mapv_kind,
5315 char *expected_line, ssize_t line_size,
5316 bool percpu_map, unsigned int next_key,
5317 int cpu, void *mapv)
5319 ssize_t nexpected_line = -1;
5321 if (mapv_kind == PPRINT_MAPV_KIND_BASIC) {
5322 struct pprint_mapv *v = mapv;
5324 nexpected_line = snprintf(expected_line, line_size,
5325 "%s%u: {%u,0,%d,0x%x,0x%x,0x%x,"
5326 "{%llu|[%u,%u,%u,%u,%u,%u,%u,%u]},%s,"
5327 "%u,0x%x,[[%d,%d],[%d,%d]]}\n",
5328 percpu_map ? "\tcpu" : "",
5329 percpu_map ? cpu : next_key,
5335 v->ui8a[0], v->ui8a[1],
5336 v->ui8a[2], v->ui8a[3],
5337 v->ui8a[4], v->ui8a[5],
5338 v->ui8a[6], v->ui8a[7],
5339 pprint_enum_str[v->aenum],
5342 v->si8_4[0][0], v->si8_4[0][1],
5343 v->si8_4[1][0], v->si8_4[1][1]);
5346 #ifdef __SIZEOF_INT128__
5347 if (mapv_kind == PPRINT_MAPV_KIND_INT128) {
5348 struct pprint_mapv_int128 *v = mapv;
5350 nexpected_line = snprintf(expected_line, line_size,
5351 "%s%u: {0x%lx,0x%lx,0x%lx,"
5352 "0x%lx%016lx,0x%lx%016lx}\n",
5353 percpu_map ? "\tcpu" : "",
5354 percpu_map ? cpu : next_key,
5355 (uint64_t)v->si128a,
5356 (uint64_t)v->si128b,
5358 (uint64_t)(v->bits80 >> 64),
5359 (uint64_t)v->bits80,
5360 (uint64_t)(v->ui128 >> 64),
5361 (uint64_t)v->ui128);
5365 return nexpected_line;
5368 static int check_line(const char *expected_line, int nexpected_line,
5369 int expected_line_len, const char *line)
5371 if (CHECK(nexpected_line == expected_line_len,
5372 "expected_line is too long"))
5375 if (strcmp(expected_line, line)) {
5376 fprintf(stderr, "unexpected pprint output\n");
5377 fprintf(stderr, "expected: %s", expected_line);
5378 fprintf(stderr, " read: %s", line);
5386 static void do_test_pprint(int test_num)
5388 const struct btf_raw_test *test = &pprint_test_template[test_num];
5389 enum pprint_mapv_kind_t mapv_kind = test->mapv_kind;
5390 LIBBPF_OPTS(bpf_map_create_opts, opts);
5391 bool ordered_map, lossless_map, percpu_map;
5392 int err, ret, num_cpus, rounded_value_size;
5393 unsigned int key, nr_read_elems;
5394 int map_fd = -1, btf_fd = -1;
5395 unsigned int raw_btf_size;
5396 char expected_line[255];
5397 FILE *pin_file = NULL;
5399 size_t line_len = 0;
5405 if (!test__start_subtest(test->descr))
5408 raw_btf = btf_raw_create(&hdr_tmpl, test->raw_types,
5409 test->str_sec, test->str_sec_size,
5410 &raw_btf_size, NULL);
5415 *btf_log_buf = '\0';
5416 btf_fd = load_raw_btf(raw_btf, raw_btf_size);
5419 if (CHECK(btf_fd < 0, "errno:%d\n", errno)) {
5424 opts.btf_fd = btf_fd;
5425 opts.btf_key_type_id = test->key_type_id;
5426 opts.btf_value_type_id = test->value_type_id;
5427 map_fd = bpf_map_create(test->map_type, test->map_name,
5428 test->key_size, test->value_size, test->max_entries, &opts);
5429 if (CHECK(map_fd < 0, "errno:%d", errno)) {
5434 ret = snprintf(pin_path, sizeof(pin_path), "%s/%s",
5435 "/sys/fs/bpf", test->map_name);
5437 if (CHECK(ret >= sizeof(pin_path), "pin_path %s/%s is too long",
5438 "/sys/fs/bpf", test->map_name)) {
5443 err = bpf_obj_pin(map_fd, pin_path);
5444 if (CHECK(err, "bpf_obj_pin(%s): errno:%d.", pin_path, errno))
5447 percpu_map = test->percpu_map;
5448 num_cpus = percpu_map ? bpf_num_possible_cpus() : 1;
5449 rounded_value_size = round_up(get_pprint_mapv_size(mapv_kind), 8);
5450 mapv = calloc(num_cpus, rounded_value_size);
5451 if (CHECK(!mapv, "mapv allocation failure")) {
5456 for (key = 0; key < test->max_entries; key++) {
5457 set_pprint_mapv(mapv_kind, mapv, key, num_cpus, rounded_value_size);
5458 bpf_map_update_elem(map_fd, &key, mapv, 0);
5461 pin_file = fopen(pin_path, "r");
5462 if (CHECK(!pin_file, "fopen(%s): errno:%d", pin_path, errno)) {
5467 /* Skip lines start with '#' */
5468 while ((nread = getline(&line, &line_len, pin_file)) > 0 &&
5472 if (CHECK(nread <= 0, "Unexpected EOF")) {
5478 ordered_map = test->ordered_map;
5479 lossless_map = test->lossless_map;
5481 ssize_t nexpected_line;
5482 unsigned int next_key;
5486 next_key = ordered_map ? nr_read_elems : atoi(line);
5487 set_pprint_mapv(mapv_kind, mapv, next_key, num_cpus, rounded_value_size);
5490 for (cpu = 0; cpu < num_cpus; cpu++) {
5492 /* for percpu map, the format looks like:
5494 * cpu0: <value_on_cpu0>
5495 * cpu1: <value_on_cpu1>
5497 * cpun: <value_on_cpun>
5500 * let us verify the line containing the key here.
5503 nexpected_line = snprintf(expected_line,
5504 sizeof(expected_line),
5508 err = check_line(expected_line, nexpected_line,
5509 sizeof(expected_line), line);
5514 /* read value@cpu */
5515 nread = getline(&line, &line_len, pin_file);
5520 nexpected_line = get_pprint_expected_line(mapv_kind, expected_line,
5521 sizeof(expected_line),
5522 percpu_map, next_key,
5524 err = check_line(expected_line, nexpected_line,
5525 sizeof(expected_line), line);
5529 cmapv = cmapv + rounded_value_size;
5533 /* skip the last bracket for the percpu map */
5534 nread = getline(&line, &line_len, pin_file);
5539 nread = getline(&line, &line_len, pin_file);
5540 } while (++nr_read_elems < test->max_entries && nread > 0);
5543 CHECK(nr_read_elems < test->max_entries,
5544 "Unexpected EOF. nr_read_elems:%u test->max_entries:%u",
5545 nr_read_elems, test->max_entries)) {
5550 if (CHECK(nread > 0, "Unexpected extra pprint output: %s", line)) {
5561 fprintf(stderr, "OK");
5562 if (*btf_log_buf && (err || always_log))
5563 fprintf(stderr, "\n%s", btf_log_buf);
5574 static void test_pprint(void)
5578 /* test various maps with the first test template */
5579 for (i = 0; i < ARRAY_SIZE(pprint_tests_meta); i++) {
5580 pprint_test_template[0].descr = pprint_tests_meta[i].descr;
5581 pprint_test_template[0].map_type = pprint_tests_meta[i].map_type;
5582 pprint_test_template[0].map_name = pprint_tests_meta[i].map_name;
5583 pprint_test_template[0].ordered_map = pprint_tests_meta[i].ordered_map;
5584 pprint_test_template[0].lossless_map = pprint_tests_meta[i].lossless_map;
5585 pprint_test_template[0].percpu_map = pprint_tests_meta[i].percpu_map;
5590 /* test rest test templates with the first map */
5591 for (i = 1; i < ARRAY_SIZE(pprint_test_template); i++) {
5592 pprint_test_template[i].descr = pprint_tests_meta[0].descr;
5593 pprint_test_template[i].map_type = pprint_tests_meta[0].map_type;
5594 pprint_test_template[i].map_name = pprint_tests_meta[0].map_name;
5595 pprint_test_template[i].ordered_map = pprint_tests_meta[0].ordered_map;
5596 pprint_test_template[i].lossless_map = pprint_tests_meta[0].lossless_map;
5597 pprint_test_template[i].percpu_map = pprint_tests_meta[0].percpu_map;
5602 #define BPF_LINE_INFO_ENC(insn_off, file_off, line_off, line_num, line_col) \
5603 (insn_off), (file_off), (line_off), ((line_num) << 10 | ((line_col) & 0x3ff))
5605 static struct prog_info_raw_test {
5607 const char *str_sec;
5608 const char *err_str;
5609 __u32 raw_types[MAX_NR_RAW_U32];
5611 struct bpf_insn insns[MAX_INSNS];
5613 __u32 func_info[MAX_SUBPROGS][2];
5614 __u32 func_info_rec_size;
5615 __u32 func_info_cnt;
5616 __u32 line_info[MAX_NR_RAW_U32];
5617 __u32 line_info_rec_size;
5618 __u32 nr_jited_ksyms;
5619 bool expected_prog_load_failure;
5620 __u32 dead_code_cnt;
5621 __u32 dead_code_mask;
5622 __u32 dead_func_cnt;
5623 __u32 dead_func_mask;
5624 } info_raw_tests[] = {
5626 .descr = "func_type (main func + one sub)",
5628 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
5629 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 32, 4), /* [2] */
5630 BTF_FUNC_PROTO_ENC(1, 2), /* [3] */
5631 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
5632 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
5633 BTF_FUNC_PROTO_ENC(1, 2), /* [4] */
5634 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
5635 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
5636 BTF_FUNC_ENC(NAME_TBD, 3), /* [5] */
5637 BTF_FUNC_ENC(NAME_TBD, 4), /* [6] */
5640 .str_sec = "\0int\0unsigned int\0a\0b\0c\0d\0funcA\0funcB",
5641 .str_sec_size = sizeof("\0int\0unsigned int\0a\0b\0c\0d\0funcA\0funcB"),
5643 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
5644 BPF_MOV64_IMM(BPF_REG_0, 1),
5646 BPF_MOV64_IMM(BPF_REG_0, 2),
5649 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
5650 .func_info = { {0, 5}, {3, 6} },
5651 .func_info_rec_size = 8,
5653 .line_info = { BTF_END_RAW },
5657 .descr = "func_type (Incorrect func_info_rec_size)",
5659 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
5660 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 32, 4), /* [2] */
5661 BTF_FUNC_PROTO_ENC(1, 2), /* [3] */
5662 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
5663 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
5664 BTF_FUNC_PROTO_ENC(1, 2), /* [4] */
5665 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
5666 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
5667 BTF_FUNC_ENC(NAME_TBD, 3), /* [5] */
5668 BTF_FUNC_ENC(NAME_TBD, 4), /* [6] */
5671 .str_sec = "\0int\0unsigned int\0a\0b\0c\0d\0funcA\0funcB",
5672 .str_sec_size = sizeof("\0int\0unsigned int\0a\0b\0c\0d\0funcA\0funcB"),
5674 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
5675 BPF_MOV64_IMM(BPF_REG_0, 1),
5677 BPF_MOV64_IMM(BPF_REG_0, 2),
5680 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
5681 .func_info = { {0, 5}, {3, 6} },
5682 .func_info_rec_size = 4,
5684 .line_info = { BTF_END_RAW },
5685 .expected_prog_load_failure = true,
5689 .descr = "func_type (Incorrect func_info_cnt)",
5691 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
5692 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 32, 4), /* [2] */
5693 BTF_FUNC_PROTO_ENC(1, 2), /* [3] */
5694 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
5695 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
5696 BTF_FUNC_PROTO_ENC(1, 2), /* [4] */
5697 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
5698 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
5699 BTF_FUNC_ENC(NAME_TBD, 3), /* [5] */
5700 BTF_FUNC_ENC(NAME_TBD, 4), /* [6] */
5703 .str_sec = "\0int\0unsigned int\0a\0b\0c\0d\0funcA\0funcB",
5704 .str_sec_size = sizeof("\0int\0unsigned int\0a\0b\0c\0d\0funcA\0funcB"),
5706 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
5707 BPF_MOV64_IMM(BPF_REG_0, 1),
5709 BPF_MOV64_IMM(BPF_REG_0, 2),
5712 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
5713 .func_info = { {0, 5}, {3, 6} },
5714 .func_info_rec_size = 8,
5716 .line_info = { BTF_END_RAW },
5717 .expected_prog_load_failure = true,
5721 .descr = "func_type (Incorrect bpf_func_info.insn_off)",
5723 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
5724 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 32, 4), /* [2] */
5725 BTF_FUNC_PROTO_ENC(1, 2), /* [3] */
5726 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
5727 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
5728 BTF_FUNC_PROTO_ENC(1, 2), /* [4] */
5729 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 2),
5730 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
5731 BTF_FUNC_ENC(NAME_TBD, 3), /* [5] */
5732 BTF_FUNC_ENC(NAME_TBD, 4), /* [6] */
5735 .str_sec = "\0int\0unsigned int\0a\0b\0c\0d\0funcA\0funcB",
5736 .str_sec_size = sizeof("\0int\0unsigned int\0a\0b\0c\0d\0funcA\0funcB"),
5738 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
5739 BPF_MOV64_IMM(BPF_REG_0, 1),
5741 BPF_MOV64_IMM(BPF_REG_0, 2),
5744 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
5745 .func_info = { {0, 5}, {2, 6} },
5746 .func_info_rec_size = 8,
5748 .line_info = { BTF_END_RAW },
5749 .expected_prog_load_failure = true,
5753 .descr = "line_info (No subprog)",
5755 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
5758 BTF_STR_SEC("\0int\0int a=1;\0int b=2;\0return a + b;\0return a + b;"),
5760 BPF_MOV64_IMM(BPF_REG_0, 1),
5761 BPF_MOV64_IMM(BPF_REG_1, 2),
5762 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
5765 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
5768 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10),
5769 BPF_LINE_INFO_ENC(1, 0, NAME_TBD, 2, 9),
5770 BPF_LINE_INFO_ENC(2, 0, NAME_TBD, 3, 8),
5771 BPF_LINE_INFO_ENC(3, 0, NAME_TBD, 4, 7),
5774 .line_info_rec_size = sizeof(struct bpf_line_info),
5775 .nr_jited_ksyms = 1,
5779 .descr = "line_info (No subprog. insn_off >= prog->len)",
5781 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
5784 BTF_STR_SEC("\0int\0int a=1;\0int b=2;\0return a + b;\0return a + b;"),
5786 BPF_MOV64_IMM(BPF_REG_0, 1),
5787 BPF_MOV64_IMM(BPF_REG_1, 2),
5788 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
5791 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
5794 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10),
5795 BPF_LINE_INFO_ENC(1, 0, NAME_TBD, 2, 9),
5796 BPF_LINE_INFO_ENC(2, 0, NAME_TBD, 3, 8),
5797 BPF_LINE_INFO_ENC(3, 0, NAME_TBD, 4, 7),
5798 BPF_LINE_INFO_ENC(4, 0, 0, 5, 6),
5801 .line_info_rec_size = sizeof(struct bpf_line_info),
5802 .nr_jited_ksyms = 1,
5803 .err_str = "line_info[4].insn_off",
5804 .expected_prog_load_failure = true,
5808 .descr = "line_info (Zero bpf insn code)",
5810 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
5811 BTF_TYPE_INT_ENC(NAME_TBD, 0, 0, 64, 8), /* [2] */
5812 BTF_TYPEDEF_ENC(NAME_TBD, 2), /* [3] */
5815 BTF_STR_SEC("\0int\0unsigned long\0u64\0u64 a=1;\0return a;"),
5817 BPF_LD_IMM64(BPF_REG_0, 1),
5820 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
5823 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10),
5824 BPF_LINE_INFO_ENC(1, 0, 0, 2, 9),
5825 BPF_LINE_INFO_ENC(2, 0, NAME_TBD, 3, 8),
5828 .line_info_rec_size = sizeof(struct bpf_line_info),
5829 .nr_jited_ksyms = 1,
5830 .err_str = "Invalid insn code at line_info[1]",
5831 .expected_prog_load_failure = true,
5835 .descr = "line_info (No subprog. zero tailing line_info",
5837 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
5840 BTF_STR_SEC("\0int\0int a=1;\0int b=2;\0return a + b;\0return a + b;"),
5842 BPF_MOV64_IMM(BPF_REG_0, 1),
5843 BPF_MOV64_IMM(BPF_REG_1, 2),
5844 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
5847 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
5850 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10), 0,
5851 BPF_LINE_INFO_ENC(1, 0, NAME_TBD, 2, 9), 0,
5852 BPF_LINE_INFO_ENC(2, 0, NAME_TBD, 3, 8), 0,
5853 BPF_LINE_INFO_ENC(3, 0, NAME_TBD, 4, 7), 0,
5856 .line_info_rec_size = sizeof(struct bpf_line_info) + sizeof(__u32),
5857 .nr_jited_ksyms = 1,
5861 .descr = "line_info (No subprog. nonzero tailing line_info)",
5863 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
5866 BTF_STR_SEC("\0int\0int a=1;\0int b=2;\0return a + b;\0return a + b;"),
5868 BPF_MOV64_IMM(BPF_REG_0, 1),
5869 BPF_MOV64_IMM(BPF_REG_1, 2),
5870 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
5873 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
5876 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10), 0,
5877 BPF_LINE_INFO_ENC(1, 0, NAME_TBD, 2, 9), 0,
5878 BPF_LINE_INFO_ENC(2, 0, NAME_TBD, 3, 8), 0,
5879 BPF_LINE_INFO_ENC(3, 0, NAME_TBD, 4, 7), 1,
5882 .line_info_rec_size = sizeof(struct bpf_line_info) + sizeof(__u32),
5883 .nr_jited_ksyms = 1,
5884 .err_str = "nonzero tailing record in line_info",
5885 .expected_prog_load_failure = true,
5889 .descr = "line_info (subprog)",
5891 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
5894 BTF_STR_SEC("\0int\0int a=1+1;\0return func(a);\0b+=1;\0return b;"),
5896 BPF_MOV64_IMM(BPF_REG_2, 1),
5897 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
5898 BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
5901 BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
5902 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 1),
5905 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
5908 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10),
5909 BPF_LINE_INFO_ENC(2, 0, NAME_TBD, 2, 9),
5910 BPF_LINE_INFO_ENC(5, 0, NAME_TBD, 3, 8),
5911 BPF_LINE_INFO_ENC(7, 0, NAME_TBD, 4, 7),
5914 .line_info_rec_size = sizeof(struct bpf_line_info),
5915 .nr_jited_ksyms = 2,
5919 .descr = "line_info (subprog + func_info)",
5921 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
5922 BTF_FUNC_PROTO_ENC(1, 1), /* [2] */
5923 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
5924 BTF_FUNC_ENC(NAME_TBD, 2), /* [3] */
5925 BTF_FUNC_ENC(NAME_TBD, 2), /* [4] */
5928 BTF_STR_SEC("\0int\0x\0sub\0main\0int a=1+1;\0return func(a);\0b+=1;\0return b;"),
5930 BPF_MOV64_IMM(BPF_REG_2, 1),
5931 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
5932 BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
5935 BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
5936 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 1),
5939 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
5941 .func_info_rec_size = 8,
5942 .func_info = { {0, 4}, {5, 3} },
5944 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10),
5945 BPF_LINE_INFO_ENC(2, 0, NAME_TBD, 2, 9),
5946 BPF_LINE_INFO_ENC(5, 0, NAME_TBD, 3, 8),
5947 BPF_LINE_INFO_ENC(7, 0, NAME_TBD, 4, 7),
5950 .line_info_rec_size = sizeof(struct bpf_line_info),
5951 .nr_jited_ksyms = 2,
5955 .descr = "line_info (subprog. missing 1st func line info)",
5957 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
5960 BTF_STR_SEC("\0int\0int a=1+1;\0return func(a);\0b+=1;\0return b;"),
5962 BPF_MOV64_IMM(BPF_REG_2, 1),
5963 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
5964 BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
5967 BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
5968 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 1),
5971 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
5974 BPF_LINE_INFO_ENC(1, 0, NAME_TBD, 1, 10),
5975 BPF_LINE_INFO_ENC(2, 0, NAME_TBD, 2, 9),
5976 BPF_LINE_INFO_ENC(5, 0, NAME_TBD, 3, 8),
5977 BPF_LINE_INFO_ENC(7, 0, NAME_TBD, 4, 7),
5980 .line_info_rec_size = sizeof(struct bpf_line_info),
5981 .nr_jited_ksyms = 2,
5982 .err_str = "missing bpf_line_info for func#0",
5983 .expected_prog_load_failure = true,
5987 .descr = "line_info (subprog. missing 2nd func line info)",
5989 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
5992 BTF_STR_SEC("\0int\0int a=1+1;\0return func(a);\0b+=1;\0return b;"),
5994 BPF_MOV64_IMM(BPF_REG_2, 1),
5995 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
5996 BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
5999 BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
6000 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 1),
6003 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
6006 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10),
6007 BPF_LINE_INFO_ENC(2, 0, NAME_TBD, 2, 9),
6008 BPF_LINE_INFO_ENC(6, 0, NAME_TBD, 3, 8),
6009 BPF_LINE_INFO_ENC(7, 0, NAME_TBD, 4, 7),
6012 .line_info_rec_size = sizeof(struct bpf_line_info),
6013 .nr_jited_ksyms = 2,
6014 .err_str = "missing bpf_line_info for func#1",
6015 .expected_prog_load_failure = true,
6019 .descr = "line_info (subprog. unordered insn offset)",
6021 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
6024 BTF_STR_SEC("\0int\0int a=1+1;\0return func(a);\0b+=1;\0return b;"),
6026 BPF_MOV64_IMM(BPF_REG_2, 1),
6027 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
6028 BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
6031 BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
6032 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 1),
6035 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
6038 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10),
6039 BPF_LINE_INFO_ENC(5, 0, NAME_TBD, 2, 9),
6040 BPF_LINE_INFO_ENC(2, 0, NAME_TBD, 3, 8),
6041 BPF_LINE_INFO_ENC(7, 0, NAME_TBD, 4, 7),
6044 .line_info_rec_size = sizeof(struct bpf_line_info),
6045 .nr_jited_ksyms = 2,
6046 .err_str = "Invalid line_info[2].insn_off",
6047 .expected_prog_load_failure = true,
6051 .descr = "line_info (dead start)",
6053 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
6056 BTF_STR_SEC("\0int\0/* dead jmp */\0int a=1;\0int b=2;\0return a + b;\0return a + b;"),
6058 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
6059 BPF_MOV64_IMM(BPF_REG_0, 1),
6060 BPF_MOV64_IMM(BPF_REG_1, 2),
6061 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
6064 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
6067 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10),
6068 BPF_LINE_INFO_ENC(1, 0, NAME_TBD, 2, 9),
6069 BPF_LINE_INFO_ENC(2, 0, NAME_TBD, 3, 8),
6070 BPF_LINE_INFO_ENC(3, 0, NAME_TBD, 4, 7),
6071 BPF_LINE_INFO_ENC(4, 0, NAME_TBD, 5, 6),
6074 .line_info_rec_size = sizeof(struct bpf_line_info),
6075 .nr_jited_ksyms = 1,
6077 .dead_code_mask = 0x01,
6081 .descr = "line_info (dead end)",
6083 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
6086 BTF_STR_SEC("\0int\0int a=1;\0int b=2;\0return a + b;\0/* dead jmp */\0return a + b;\0/* dead exit */"),
6088 BPF_MOV64_IMM(BPF_REG_0, 1),
6089 BPF_MOV64_IMM(BPF_REG_1, 2),
6090 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
6091 BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 10, 1),
6095 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
6098 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 12),
6099 BPF_LINE_INFO_ENC(1, 0, NAME_TBD, 2, 11),
6100 BPF_LINE_INFO_ENC(2, 0, NAME_TBD, 3, 10),
6101 BPF_LINE_INFO_ENC(3, 0, NAME_TBD, 4, 9),
6102 BPF_LINE_INFO_ENC(4, 0, NAME_TBD, 5, 8),
6103 BPF_LINE_INFO_ENC(5, 0, NAME_TBD, 6, 7),
6106 .line_info_rec_size = sizeof(struct bpf_line_info),
6107 .nr_jited_ksyms = 1,
6109 .dead_code_mask = 0x28,
6113 .descr = "line_info (dead code + subprog + func_info)",
6115 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
6116 BTF_FUNC_PROTO_ENC(1, 1), /* [2] */
6117 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
6118 BTF_FUNC_ENC(NAME_TBD, 2), /* [3] */
6119 BTF_FUNC_ENC(NAME_TBD, 2), /* [4] */
6122 BTF_STR_SEC("\0int\0x\0sub\0main\0int a=1+1;\0/* dead jmp */"
6123 "\0/* dead */\0/* dead */\0/* dead */\0/* dead */"
6124 "\0/* dead */\0/* dead */\0/* dead */\0/* dead */"
6125 "\0return func(a);\0b+=1;\0return b;"),
6127 BPF_MOV64_IMM(BPF_REG_2, 1),
6128 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
6129 BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
6130 BPF_JMP_IMM(BPF_JGE, BPF_REG_2, 0, 8),
6131 BPF_MOV64_IMM(BPF_REG_2, 1),
6132 BPF_MOV64_IMM(BPF_REG_2, 1),
6133 BPF_MOV64_IMM(BPF_REG_2, 1),
6134 BPF_MOV64_IMM(BPF_REG_2, 1),
6135 BPF_MOV64_IMM(BPF_REG_2, 1),
6136 BPF_MOV64_IMM(BPF_REG_2, 1),
6137 BPF_MOV64_IMM(BPF_REG_2, 1),
6138 BPF_MOV64_IMM(BPF_REG_2, 1),
6141 BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
6142 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 1),
6145 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
6147 .func_info_rec_size = 8,
6148 .func_info = { {0, 4}, {14, 3} },
6150 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10),
6151 BPF_LINE_INFO_ENC(3, 0, NAME_TBD, 1, 10),
6152 BPF_LINE_INFO_ENC(4, 0, NAME_TBD, 1, 10),
6153 BPF_LINE_INFO_ENC(5, 0, NAME_TBD, 1, 10),
6154 BPF_LINE_INFO_ENC(6, 0, NAME_TBD, 1, 10),
6155 BPF_LINE_INFO_ENC(7, 0, NAME_TBD, 1, 10),
6156 BPF_LINE_INFO_ENC(8, 0, NAME_TBD, 1, 10),
6157 BPF_LINE_INFO_ENC(9, 0, NAME_TBD, 1, 10),
6158 BPF_LINE_INFO_ENC(10, 0, NAME_TBD, 1, 10),
6159 BPF_LINE_INFO_ENC(11, 0, NAME_TBD, 2, 9),
6160 BPF_LINE_INFO_ENC(12, 0, NAME_TBD, 2, 9),
6161 BPF_LINE_INFO_ENC(14, 0, NAME_TBD, 3, 8),
6162 BPF_LINE_INFO_ENC(16, 0, NAME_TBD, 4, 7),
6165 .line_info_rec_size = sizeof(struct bpf_line_info),
6166 .nr_jited_ksyms = 2,
6168 .dead_code_mask = 0x3fe,
6172 .descr = "line_info (dead subprog)",
6174 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
6175 BTF_FUNC_PROTO_ENC(1, 1), /* [2] */
6176 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
6177 BTF_FUNC_ENC(NAME_TBD, 2), /* [3] */
6178 BTF_FUNC_ENC(NAME_TBD, 2), /* [4] */
6179 BTF_FUNC_ENC(NAME_TBD, 2), /* [5] */
6182 BTF_STR_SEC("\0int\0x\0dead\0main\0func\0int a=1+1;\0/* live call */"
6183 "\0return 0;\0return 0;\0/* dead */\0/* dead */"
6184 "\0/* dead */\0return bla + 1;\0return bla + 1;"
6185 "\0return bla + 1;\0return func(a);\0b+=1;\0return b;"),
6187 BPF_MOV64_IMM(BPF_REG_2, 1),
6188 BPF_JMP_IMM(BPF_JGE, BPF_REG_2, 0, 1),
6191 BPF_MOV64_IMM(BPF_REG_0, 0),
6193 BPF_MOV64_IMM(BPF_REG_0, 0),
6196 BPF_MOV64_REG(BPF_REG_0, 2),
6197 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 1),
6200 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
6202 .func_info_rec_size = 8,
6203 .func_info = { {0, 4}, {6, 3}, {9, 5} },
6205 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10),
6206 BPF_LINE_INFO_ENC(3, 0, NAME_TBD, 1, 10),
6207 BPF_LINE_INFO_ENC(4, 0, NAME_TBD, 1, 10),
6208 BPF_LINE_INFO_ENC(5, 0, NAME_TBD, 1, 10),
6209 BPF_LINE_INFO_ENC(6, 0, NAME_TBD, 1, 10),
6210 BPF_LINE_INFO_ENC(7, 0, NAME_TBD, 1, 10),
6211 BPF_LINE_INFO_ENC(8, 0, NAME_TBD, 1, 10),
6212 BPF_LINE_INFO_ENC(9, 0, NAME_TBD, 1, 10),
6213 BPF_LINE_INFO_ENC(10, 0, NAME_TBD, 1, 10),
6214 BPF_LINE_INFO_ENC(11, 0, NAME_TBD, 2, 9),
6217 .line_info_rec_size = sizeof(struct bpf_line_info),
6218 .nr_jited_ksyms = 2,
6220 .dead_code_mask = 0x70,
6222 .dead_func_mask = 0x2,
6226 .descr = "line_info (dead last subprog)",
6228 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
6229 BTF_FUNC_PROTO_ENC(1, 1), /* [2] */
6230 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
6231 BTF_FUNC_ENC(NAME_TBD, 2), /* [3] */
6232 BTF_FUNC_ENC(NAME_TBD, 2), /* [5] */
6235 BTF_STR_SEC("\0int\0x\0dead\0main\0int a=1+1;\0/* live call */"
6236 "\0return 0;\0/* dead */\0/* dead */"),
6238 BPF_MOV64_IMM(BPF_REG_2, 1),
6239 BPF_JMP_IMM(BPF_JGE, BPF_REG_2, 0, 1),
6241 BPF_MOV64_IMM(BPF_REG_0, 0),
6243 BPF_MOV64_IMM(BPF_REG_0, 0),
6246 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
6248 .func_info_rec_size = 8,
6249 .func_info = { {0, 4}, {5, 3} },
6251 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10),
6252 BPF_LINE_INFO_ENC(3, 0, NAME_TBD, 1, 10),
6253 BPF_LINE_INFO_ENC(4, 0, NAME_TBD, 1, 10),
6254 BPF_LINE_INFO_ENC(5, 0, NAME_TBD, 1, 10),
6255 BPF_LINE_INFO_ENC(6, 0, NAME_TBD, 1, 10),
6258 .line_info_rec_size = sizeof(struct bpf_line_info),
6259 .nr_jited_ksyms = 1,
6261 .dead_code_mask = 0x18,
6263 .dead_func_mask = 0x2,
6267 .descr = "line_info (dead subprog + dead start)",
6269 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
6270 BTF_FUNC_PROTO_ENC(1, 1), /* [2] */
6271 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
6272 BTF_FUNC_ENC(NAME_TBD, 2), /* [3] */
6273 BTF_FUNC_ENC(NAME_TBD, 2), /* [4] */
6274 BTF_FUNC_ENC(NAME_TBD, 2), /* [5] */
6277 BTF_STR_SEC("\0int\0x\0dead\0main\0func\0int a=1+1;\0/* dead */"
6278 "\0return 0;\0return 0;\0return 0;"
6279 "\0/* dead */\0/* dead */\0/* dead */\0/* dead */"
6280 "\0return b + 1;\0return b + 1;\0return b + 1;"),
6282 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
6283 BPF_MOV64_IMM(BPF_REG_2, 1),
6284 BPF_JMP_IMM(BPF_JGE, BPF_REG_2, 0, 1),
6287 BPF_MOV64_IMM(BPF_REG_0, 0),
6289 BPF_MOV64_IMM(BPF_REG_0, 0),
6292 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
6293 BPF_MOV64_REG(BPF_REG_0, 2),
6294 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 1),
6297 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
6299 .func_info_rec_size = 8,
6300 .func_info = { {0, 4}, {7, 3}, {10, 5} },
6302 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10),
6303 BPF_LINE_INFO_ENC(3, 0, NAME_TBD, 1, 10),
6304 BPF_LINE_INFO_ENC(4, 0, NAME_TBD, 1, 10),
6305 BPF_LINE_INFO_ENC(5, 0, NAME_TBD, 1, 10),
6306 BPF_LINE_INFO_ENC(6, 0, NAME_TBD, 1, 10),
6307 BPF_LINE_INFO_ENC(7, 0, NAME_TBD, 1, 10),
6308 BPF_LINE_INFO_ENC(8, 0, NAME_TBD, 1, 10),
6309 BPF_LINE_INFO_ENC(9, 0, NAME_TBD, 1, 10),
6310 BPF_LINE_INFO_ENC(10, 0, NAME_TBD, 1, 10),
6311 BPF_LINE_INFO_ENC(11, 0, NAME_TBD, 2, 9),
6312 BPF_LINE_INFO_ENC(12, 0, NAME_TBD, 2, 9),
6313 BPF_LINE_INFO_ENC(13, 0, NAME_TBD, 2, 9),
6316 .line_info_rec_size = sizeof(struct bpf_line_info),
6317 .nr_jited_ksyms = 2,
6319 .dead_code_mask = 0x1e2,
6321 .dead_func_mask = 0x2,
6325 .descr = "line_info (dead subprog + dead start w/ move)",
6327 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
6328 BTF_FUNC_PROTO_ENC(1, 1), /* [2] */
6329 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
6330 BTF_FUNC_ENC(NAME_TBD, 2), /* [3] */
6331 BTF_FUNC_ENC(NAME_TBD, 2), /* [4] */
6332 BTF_FUNC_ENC(NAME_TBD, 2), /* [5] */
6335 BTF_STR_SEC("\0int\0x\0dead\0main\0func\0int a=1+1;\0/* live call */"
6336 "\0return 0;\0return 0;\0/* dead */\0/* dead */"
6337 "\0/* dead */\0return bla + 1;\0return bla + 1;"
6338 "\0return bla + 1;\0return func(a);\0b+=1;\0return b;"),
6340 BPF_MOV64_IMM(BPF_REG_2, 1),
6341 BPF_JMP_IMM(BPF_JGE, BPF_REG_2, 0, 1),
6344 BPF_MOV64_IMM(BPF_REG_0, 0),
6346 BPF_MOV64_IMM(BPF_REG_0, 0),
6349 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
6350 BPF_MOV64_REG(BPF_REG_0, 2),
6351 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 1),
6354 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
6356 .func_info_rec_size = 8,
6357 .func_info = { {0, 4}, {6, 3}, {9, 5} },
6359 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10),
6360 BPF_LINE_INFO_ENC(3, 0, NAME_TBD, 1, 10),
6361 BPF_LINE_INFO_ENC(4, 0, NAME_TBD, 1, 10),
6362 BPF_LINE_INFO_ENC(5, 0, NAME_TBD, 1, 10),
6363 BPF_LINE_INFO_ENC(6, 0, NAME_TBD, 1, 10),
6364 BPF_LINE_INFO_ENC(7, 0, NAME_TBD, 1, 10),
6365 BPF_LINE_INFO_ENC(8, 0, NAME_TBD, 1, 10),
6366 BPF_LINE_INFO_ENC(9, 0, NAME_TBD, 1, 10),
6367 BPF_LINE_INFO_ENC(11, 0, NAME_TBD, 1, 10),
6368 BPF_LINE_INFO_ENC(12, 0, NAME_TBD, 2, 9),
6371 .line_info_rec_size = sizeof(struct bpf_line_info),
6372 .nr_jited_ksyms = 2,
6374 .dead_code_mask = 0x70,
6376 .dead_func_mask = 0x2,
6380 .descr = "line_info (dead end + subprog start w/ no linfo)",
6382 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
6383 BTF_FUNC_PROTO_ENC(1, 1), /* [2] */
6384 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
6385 BTF_FUNC_ENC(NAME_TBD, 2), /* [3] */
6386 BTF_FUNC_ENC(NAME_TBD, 2), /* [4] */
6389 BTF_STR_SEC("\0int\0x\0main\0func\0/* main linfo */\0/* func linfo */"),
6391 BPF_MOV64_IMM(BPF_REG_0, 0),
6392 BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 1, 3),
6394 BPF_MOV64_IMM(BPF_REG_0, 0),
6397 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
6400 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
6402 .func_info_rec_size = 8,
6403 .func_info = { {0, 3}, {6, 4}, },
6405 BPF_LINE_INFO_ENC(0, 0, NAME_TBD, 1, 10),
6406 BPF_LINE_INFO_ENC(6, 0, NAME_TBD, 1, 10),
6409 .line_info_rec_size = sizeof(struct bpf_line_info),
6410 .nr_jited_ksyms = 2,
6415 static size_t probe_prog_length(const struct bpf_insn *fp)
6419 for (len = MAX_INSNS - 1; len > 0; --len)
6420 if (fp[len].code != 0 || fp[len].imm != 0)
6425 static __u32 *patch_name_tbd(const __u32 *raw_u32,
6426 const char *str, __u32 str_off,
6427 unsigned int str_sec_size,
6428 unsigned int *ret_size)
6430 int i, raw_u32_size = get_raw_sec_size(raw_u32);
6431 const char *end_str = str + str_sec_size;
6432 const char *next_str = str + str_off;
6433 __u32 *new_u32 = NULL;
6435 if (raw_u32_size == -1)
6436 return ERR_PTR(-EINVAL);
6438 if (!raw_u32_size) {
6443 new_u32 = malloc(raw_u32_size);
6445 return ERR_PTR(-ENOMEM);
6447 for (i = 0; i < raw_u32_size / sizeof(raw_u32[0]); i++) {
6448 if (raw_u32[i] == NAME_TBD) {
6449 next_str = get_next_str(next_str, end_str);
6450 if (CHECK(!next_str, "Error in getting next_str\n")) {
6452 return ERR_PTR(-EINVAL);
6454 new_u32[i] = next_str - str;
6455 next_str += strlen(next_str);
6457 new_u32[i] = raw_u32[i];
6461 *ret_size = raw_u32_size;
6465 static int test_get_finfo(const struct prog_info_raw_test *test,
6468 struct bpf_prog_info info = {};
6469 struct bpf_func_info *finfo;
6470 __u32 info_len, rec_size, i;
6471 void *func_info = NULL;
6475 /* get necessary lens */
6476 info_len = sizeof(struct bpf_prog_info);
6477 err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len);
6478 if (CHECK(err < 0, "invalid get info (1st) errno:%d", errno)) {
6479 fprintf(stderr, "%s\n", btf_log_buf);
6482 nr_func_info = test->func_info_cnt - test->dead_func_cnt;
6483 if (CHECK(info.nr_func_info != nr_func_info,
6484 "incorrect info.nr_func_info (1st) %d",
6485 info.nr_func_info)) {
6489 rec_size = info.func_info_rec_size;
6490 if (CHECK(rec_size != sizeof(struct bpf_func_info),
6491 "incorrect info.func_info_rec_size (1st) %d", rec_size)) {
6495 if (!info.nr_func_info)
6498 func_info = malloc(info.nr_func_info * rec_size);
6499 if (CHECK(!func_info, "out of memory"))
6502 /* reset info to only retrieve func_info related data */
6503 memset(&info, 0, sizeof(info));
6504 info.nr_func_info = nr_func_info;
6505 info.func_info_rec_size = rec_size;
6506 info.func_info = ptr_to_u64(func_info);
6507 err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len);
6508 if (CHECK(err < 0, "invalid get info (2nd) errno:%d", errno)) {
6509 fprintf(stderr, "%s\n", btf_log_buf);
6513 if (CHECK(info.nr_func_info != nr_func_info,
6514 "incorrect info.nr_func_info (2nd) %d",
6515 info.nr_func_info)) {
6519 if (CHECK(info.func_info_rec_size != rec_size,
6520 "incorrect info.func_info_rec_size (2nd) %d",
6521 info.func_info_rec_size)) {
6527 for (i = 0; i < nr_func_info; i++) {
6528 if (test->dead_func_mask & (1 << i))
6530 if (CHECK(finfo->type_id != test->func_info[i][1],
6531 "incorrect func_type %u expected %u",
6532 finfo->type_id, test->func_info[i][1])) {
6536 finfo = (void *)finfo + rec_size;
6546 static int test_get_linfo(const struct prog_info_raw_test *test,
6547 const void *patched_linfo,
6548 __u32 cnt, int prog_fd)
6550 __u32 i, info_len, nr_jited_ksyms, nr_jited_func_lens;
6551 __u64 *jited_linfo = NULL, *jited_ksyms = NULL;
6552 __u32 rec_size, jited_rec_size, jited_cnt;
6553 struct bpf_line_info *linfo = NULL;
6554 __u32 cur_func_len, ksyms_found;
6555 struct bpf_prog_info info = {};
6556 __u32 *jited_func_lens = NULL;
6557 __u64 cur_func_ksyms;
6562 rec_size = sizeof(*linfo);
6563 jited_rec_size = sizeof(*jited_linfo);
6564 if (test->nr_jited_ksyms)
6565 nr_jited_ksyms = test->nr_jited_ksyms;
6567 nr_jited_ksyms = test->func_info_cnt - test->dead_func_cnt;
6568 nr_jited_func_lens = nr_jited_ksyms;
6570 info_len = sizeof(struct bpf_prog_info);
6571 err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len);
6572 if (CHECK(err < 0, "err:%d errno:%d", err, errno)) {
6577 if (!info.jited_prog_len) {
6578 /* prog is not jited */
6581 nr_jited_func_lens = 1;
6584 if (CHECK(info.nr_line_info != cnt ||
6585 info.nr_jited_line_info != jited_cnt ||
6586 info.nr_jited_ksyms != nr_jited_ksyms ||
6587 info.nr_jited_func_lens != nr_jited_func_lens ||
6588 (!info.nr_line_info && info.nr_jited_line_info),
6589 "info: nr_line_info:%u(expected:%u) nr_jited_line_info:%u(expected:%u) nr_jited_ksyms:%u(expected:%u) nr_jited_func_lens:%u(expected:%u)",
6590 info.nr_line_info, cnt,
6591 info.nr_jited_line_info, jited_cnt,
6592 info.nr_jited_ksyms, nr_jited_ksyms,
6593 info.nr_jited_func_lens, nr_jited_func_lens)) {
6598 if (CHECK(info.line_info_rec_size != sizeof(struct bpf_line_info) ||
6599 info.jited_line_info_rec_size != sizeof(__u64),
6600 "info: line_info_rec_size:%u(userspace expected:%u) jited_line_info_rec_size:%u(userspace expected:%u)",
6601 info.line_info_rec_size, rec_size,
6602 info.jited_line_info_rec_size, jited_rec_size)) {
6610 rec_size = info.line_info_rec_size;
6611 jited_rec_size = info.jited_line_info_rec_size;
6613 memset(&info, 0, sizeof(info));
6615 linfo = calloc(cnt, rec_size);
6616 if (CHECK(!linfo, "!linfo")) {
6620 info.nr_line_info = cnt;
6621 info.line_info_rec_size = rec_size;
6622 info.line_info = ptr_to_u64(linfo);
6625 jited_linfo = calloc(jited_cnt, jited_rec_size);
6626 jited_ksyms = calloc(nr_jited_ksyms, sizeof(*jited_ksyms));
6627 jited_func_lens = calloc(nr_jited_func_lens,
6628 sizeof(*jited_func_lens));
6629 if (CHECK(!jited_linfo || !jited_ksyms || !jited_func_lens,
6630 "jited_linfo:%p jited_ksyms:%p jited_func_lens:%p",
6631 jited_linfo, jited_ksyms, jited_func_lens)) {
6636 info.nr_jited_line_info = jited_cnt;
6637 info.jited_line_info_rec_size = jited_rec_size;
6638 info.jited_line_info = ptr_to_u64(jited_linfo);
6639 info.nr_jited_ksyms = nr_jited_ksyms;
6640 info.jited_ksyms = ptr_to_u64(jited_ksyms);
6641 info.nr_jited_func_lens = nr_jited_func_lens;
6642 info.jited_func_lens = ptr_to_u64(jited_func_lens);
6645 err = bpf_prog_get_info_by_fd(prog_fd, &info, &info_len);
6648 * Only recheck the info.*line_info* fields.
6649 * Other fields are not the concern of this test.
6651 if (CHECK(err < 0 ||
6652 info.nr_line_info != cnt ||
6653 (jited_cnt && !info.jited_line_info) ||
6654 info.nr_jited_line_info != jited_cnt ||
6655 info.line_info_rec_size != rec_size ||
6656 info.jited_line_info_rec_size != jited_rec_size,
6657 "err:%d errno:%d info: nr_line_info:%u(expected:%u) nr_jited_line_info:%u(expected:%u) line_info_rec_size:%u(expected:%u) jited_linfo_rec_size:%u(expected:%u) line_info:%p jited_line_info:%p",
6659 info.nr_line_info, cnt,
6660 info.nr_jited_line_info, jited_cnt,
6661 info.line_info_rec_size, rec_size,
6662 info.jited_line_info_rec_size, jited_rec_size,
6663 (void *)(long)info.line_info,
6664 (void *)(long)info.jited_line_info)) {
6670 while (test->dead_code_mask & (1 << dead_insns))
6673 CHECK(linfo[0].insn_off, "linfo[0].insn_off:%u",
6675 for (i = 1; i < cnt; i++) {
6676 const struct bpf_line_info *expected_linfo;
6678 while (test->dead_code_mask & (1 << (i + dead_insns)))
6681 expected_linfo = patched_linfo +
6682 ((i + dead_insns) * test->line_info_rec_size);
6683 if (CHECK(linfo[i].insn_off <= linfo[i - 1].insn_off,
6684 "linfo[%u].insn_off:%u <= linfo[%u].insn_off:%u",
6685 i, linfo[i].insn_off,
6686 i - 1, linfo[i - 1].insn_off)) {
6690 if (CHECK(linfo[i].file_name_off != expected_linfo->file_name_off ||
6691 linfo[i].line_off != expected_linfo->line_off ||
6692 linfo[i].line_col != expected_linfo->line_col,
6693 "linfo[%u] (%u, %u, %u) != (%u, %u, %u)", i,
6694 linfo[i].file_name_off,
6697 expected_linfo->file_name_off,
6698 expected_linfo->line_off,
6699 expected_linfo->line_col)) {
6706 fprintf(stderr, "not jited. skipping jited_line_info check. ");
6711 if (CHECK(jited_linfo[0] != jited_ksyms[0],
6712 "jited_linfo[0]:%lx != jited_ksyms[0]:%lx",
6713 (long)(jited_linfo[0]), (long)(jited_ksyms[0]))) {
6719 cur_func_len = jited_func_lens[0];
6720 cur_func_ksyms = jited_ksyms[0];
6721 for (i = 1; i < jited_cnt; i++) {
6722 if (ksyms_found < nr_jited_ksyms &&
6723 jited_linfo[i] == jited_ksyms[ksyms_found]) {
6724 cur_func_ksyms = jited_ksyms[ksyms_found];
6725 cur_func_len = jited_ksyms[ksyms_found];
6730 if (CHECK(jited_linfo[i] <= jited_linfo[i - 1],
6731 "jited_linfo[%u]:%lx <= jited_linfo[%u]:%lx",
6732 i, (long)jited_linfo[i],
6733 i - 1, (long)(jited_linfo[i - 1]))) {
6738 if (CHECK(jited_linfo[i] - cur_func_ksyms > cur_func_len,
6739 "jited_linfo[%u]:%lx - %lx > %u",
6740 i, (long)jited_linfo[i], (long)cur_func_ksyms,
6747 if (CHECK(ksyms_found != nr_jited_ksyms,
6748 "ksyms_found:%u != nr_jited_ksyms:%u",
6749 ksyms_found, nr_jited_ksyms)) {
6760 free(jited_func_lens);
6764 static void do_test_info_raw(unsigned int test_num)
6766 const struct prog_info_raw_test *test = &info_raw_tests[test_num - 1];
6767 unsigned int raw_btf_size, linfo_str_off, linfo_size = 0;
6768 int btf_fd = -1, prog_fd = -1, err = 0;
6769 void *raw_btf, *patched_linfo = NULL;
6770 const char *ret_next_str;
6771 union bpf_attr attr = {};
6773 if (!test__start_subtest(test->descr))
6776 raw_btf = btf_raw_create(&hdr_tmpl, test->raw_types,
6777 test->str_sec, test->str_sec_size,
6778 &raw_btf_size, &ret_next_str);
6782 *btf_log_buf = '\0';
6783 btf_fd = load_raw_btf(raw_btf, raw_btf_size);
6786 if (CHECK(btf_fd < 0, "invalid btf_fd errno:%d", errno)) {
6791 if (*btf_log_buf && always_log)
6792 fprintf(stderr, "\n%s", btf_log_buf);
6793 *btf_log_buf = '\0';
6795 linfo_str_off = ret_next_str - test->str_sec;
6796 patched_linfo = patch_name_tbd(test->line_info,
6797 test->str_sec, linfo_str_off,
6798 test->str_sec_size, &linfo_size);
6799 err = libbpf_get_error(patched_linfo);
6801 fprintf(stderr, "error in creating raw bpf_line_info");
6806 attr.prog_type = test->prog_type;
6807 attr.insns = ptr_to_u64(test->insns);
6808 attr.insn_cnt = probe_prog_length(test->insns);
6809 attr.license = ptr_to_u64("GPL");
6810 attr.prog_btf_fd = btf_fd;
6811 attr.func_info_rec_size = test->func_info_rec_size;
6812 attr.func_info_cnt = test->func_info_cnt;
6813 attr.func_info = ptr_to_u64(test->func_info);
6814 attr.log_buf = ptr_to_u64(btf_log_buf);
6815 attr.log_size = BTF_LOG_BUF_SIZE;
6818 attr.line_info_rec_size = test->line_info_rec_size;
6819 attr.line_info = ptr_to_u64(patched_linfo);
6820 attr.line_info_cnt = linfo_size / attr.line_info_rec_size;
6823 prog_fd = syscall(__NR_bpf, BPF_PROG_LOAD, &attr, sizeof(attr));
6824 err = ((prog_fd < 0) != test->expected_prog_load_failure);
6825 if (CHECK(err, "prog_fd:%d expected_prog_load_failure:%u errno:%d",
6826 prog_fd, test->expected_prog_load_failure, errno) ||
6827 CHECK(test->err_str && !strstr(btf_log_buf, test->err_str),
6828 "expected err_str:%s", test->err_str)) {
6836 err = test_get_finfo(test, prog_fd);
6840 err = test_get_linfo(test, patched_linfo,
6841 attr.line_info_cnt - test->dead_code_cnt,
6847 if (*btf_log_buf && (err || always_log))
6848 fprintf(stderr, "\n%s", btf_log_buf);
6855 if (!libbpf_get_error(patched_linfo))
6856 free(patched_linfo);
6859 struct btf_raw_data {
6860 __u32 raw_types[MAX_NR_RAW_U32];
6861 const char *str_sec;
6865 struct btf_dedup_test {
6867 struct btf_raw_data input;
6868 struct btf_raw_data expect;
6869 struct btf_dedup_opts opts;
6872 static struct btf_dedup_test dedup_tests[] = {
6875 .descr = "dedup: unused strings filtering",
6878 BTF_TYPE_INT_ENC(NAME_NTH(2), BTF_INT_SIGNED, 0, 32, 4),
6879 BTF_TYPE_INT_ENC(NAME_NTH(5), BTF_INT_SIGNED, 0, 64, 8),
6882 BTF_STR_SEC("\0unused\0int\0foo\0bar\0long"),
6886 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_SIGNED, 0, 32, 4),
6887 BTF_TYPE_INT_ENC(NAME_NTH(2), BTF_INT_SIGNED, 0, 64, 8),
6890 BTF_STR_SEC("\0int\0long"),
6894 .descr = "dedup: strings deduplication",
6897 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_SIGNED, 0, 32, 4),
6898 BTF_TYPE_INT_ENC(NAME_NTH(2), BTF_INT_SIGNED, 0, 64, 8),
6899 BTF_TYPE_INT_ENC(NAME_NTH(3), BTF_INT_SIGNED, 0, 32, 4),
6900 BTF_TYPE_INT_ENC(NAME_NTH(4), BTF_INT_SIGNED, 0, 64, 8),
6901 BTF_TYPE_INT_ENC(NAME_NTH(5), BTF_INT_SIGNED, 0, 32, 4),
6904 BTF_STR_SEC("\0int\0long int\0int\0long int\0int"),
6908 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_SIGNED, 0, 32, 4),
6909 BTF_TYPE_INT_ENC(NAME_NTH(2), BTF_INT_SIGNED, 0, 64, 8),
6912 BTF_STR_SEC("\0int\0long int"),
6916 .descr = "dedup: struct example #1",
6928 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_SIGNED, 0, 32, 4), /* [1] */
6930 BTF_TYPE_ARRAY_ENC(1, 1, 16), /* [2] */
6932 BTF_STRUCT_ENC(NAME_NTH(2), 5, 88), /* [3] */
6933 BTF_MEMBER_ENC(NAME_NTH(3), 4, 0), /* struct s *next; */
6934 BTF_MEMBER_ENC(NAME_NTH(4), 5, 64), /* const int *a; */
6935 BTF_MEMBER_ENC(NAME_NTH(5), 2, 128), /* int b[16]; */
6936 BTF_MEMBER_ENC(NAME_NTH(6), 1, 640), /* int c; */
6937 BTF_MEMBER_ENC(NAME_NTH(8), 15, 672), /* float d; */
6938 /* ptr -> [3] struct s */
6939 BTF_PTR_ENC(3), /* [4] */
6940 /* ptr -> [6] const int */
6941 BTF_PTR_ENC(6), /* [5] */
6942 /* const -> [1] int */
6943 BTF_CONST_ENC(1), /* [6] */
6944 /* tag -> [3] struct s */
6945 BTF_DECL_TAG_ENC(NAME_NTH(2), 3, -1), /* [7] */
6946 /* tag -> [3] struct s, member 1 */
6947 BTF_DECL_TAG_ENC(NAME_NTH(2), 3, 1), /* [8] */
6949 /* full copy of the above */
6950 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_SIGNED, 0, 32, 4), /* [9] */
6951 BTF_TYPE_ARRAY_ENC(9, 9, 16), /* [10] */
6952 BTF_STRUCT_ENC(NAME_NTH(2), 5, 88), /* [11] */
6953 BTF_MEMBER_ENC(NAME_NTH(3), 12, 0),
6954 BTF_MEMBER_ENC(NAME_NTH(4), 13, 64),
6955 BTF_MEMBER_ENC(NAME_NTH(5), 10, 128),
6956 BTF_MEMBER_ENC(NAME_NTH(6), 9, 640),
6957 BTF_MEMBER_ENC(NAME_NTH(8), 15, 672),
6958 BTF_PTR_ENC(11), /* [12] */
6959 BTF_PTR_ENC(14), /* [13] */
6960 BTF_CONST_ENC(9), /* [14] */
6961 BTF_TYPE_FLOAT_ENC(NAME_NTH(7), 4), /* [15] */
6962 BTF_DECL_TAG_ENC(NAME_NTH(2), 11, -1), /* [16] */
6963 BTF_DECL_TAG_ENC(NAME_NTH(2), 11, 1), /* [17] */
6966 BTF_STR_SEC("\0int\0s\0next\0a\0b\0c\0float\0d"),
6971 BTF_TYPE_INT_ENC(NAME_NTH(5), BTF_INT_SIGNED, 0, 32, 4), /* [1] */
6973 BTF_TYPE_ARRAY_ENC(1, 1, 16), /* [2] */
6975 BTF_STRUCT_ENC(NAME_NTH(8), 5, 88), /* [3] */
6976 BTF_MEMBER_ENC(NAME_NTH(7), 4, 0), /* struct s *next; */
6977 BTF_MEMBER_ENC(NAME_NTH(1), 5, 64), /* const int *a; */
6978 BTF_MEMBER_ENC(NAME_NTH(2), 2, 128), /* int b[16]; */
6979 BTF_MEMBER_ENC(NAME_NTH(3), 1, 640), /* int c; */
6980 BTF_MEMBER_ENC(NAME_NTH(4), 9, 672), /* float d; */
6981 /* ptr -> [3] struct s */
6982 BTF_PTR_ENC(3), /* [4] */
6983 /* ptr -> [6] const int */
6984 BTF_PTR_ENC(6), /* [5] */
6985 /* const -> [1] int */
6986 BTF_CONST_ENC(1), /* [6] */
6987 BTF_DECL_TAG_ENC(NAME_NTH(2), 3, -1), /* [7] */
6988 BTF_DECL_TAG_ENC(NAME_NTH(2), 3, 1), /* [8] */
6989 BTF_TYPE_FLOAT_ENC(NAME_NTH(7), 4), /* [9] */
6992 BTF_STR_SEC("\0a\0b\0c\0d\0int\0float\0next\0s"),
6996 .descr = "dedup: struct <-> fwd resolution w/ hash collision",
7012 BTF_FWD_ENC(NAME_TBD, 0 /* struct fwd */), /* [1] fwd x */
7013 BTF_PTR_ENC(1), /* [2] ptr -> [1] */
7014 BTF_STRUCT_ENC(NAME_TBD, 1, 8), /* [3] struct s */
7015 BTF_MEMBER_ENC(NAME_TBD, 2, 0),
7017 BTF_STRUCT_ENC(NAME_TBD, 0, 0), /* [4] struct x */
7018 BTF_PTR_ENC(4), /* [5] ptr -> [4] */
7019 BTF_STRUCT_ENC(NAME_TBD, 1, 8), /* [6] struct s */
7020 BTF_MEMBER_ENC(NAME_TBD, 5, 0),
7023 BTF_STR_SEC("\0x\0s\0x\0x\0s\0x\0"),
7027 BTF_PTR_ENC(3), /* [1] ptr -> [3] */
7028 BTF_STRUCT_ENC(NAME_TBD, 1, 8), /* [2] struct s */
7029 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
7030 BTF_STRUCT_ENC(NAME_NTH(2), 0, 0), /* [3] struct x */
7033 BTF_STR_SEC("\0s\0x"),
7036 .force_collisions = true, /* force hash collisions */
7040 .descr = "dedup: void equiv check",
7054 BTF_STRUCT_ENC(0, 0, 1), /* [1] struct {} */
7055 BTF_PTR_ENC(1), /* [2] ptr -> [1] */
7056 BTF_STRUCT_ENC(NAME_NTH(1), 1, 8), /* [3] struct s */
7057 BTF_MEMBER_ENC(NAME_NTH(2), 2, 0),
7059 BTF_PTR_ENC(0), /* [4] ptr -> void */
7060 BTF_STRUCT_ENC(NAME_NTH(1), 1, 8), /* [5] struct s */
7061 BTF_MEMBER_ENC(NAME_NTH(2), 4, 0),
7064 BTF_STR_SEC("\0s\0x"),
7069 BTF_STRUCT_ENC(0, 0, 1), /* [1] struct {} */
7070 BTF_PTR_ENC(1), /* [2] ptr -> [1] */
7071 BTF_STRUCT_ENC(NAME_NTH(1), 1, 8), /* [3] struct s */
7072 BTF_MEMBER_ENC(NAME_NTH(2), 2, 0),
7074 BTF_PTR_ENC(0), /* [4] ptr -> void */
7075 BTF_STRUCT_ENC(NAME_NTH(1), 1, 8), /* [5] struct s */
7076 BTF_MEMBER_ENC(NAME_NTH(2), 4, 0),
7079 BTF_STR_SEC("\0s\0x"),
7082 .force_collisions = true, /* force hash collisions */
7086 .descr = "dedup: all possible kinds (no duplicates)",
7089 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 8), /* [1] int */
7090 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_ENUM, 0, 2), 4), /* [2] enum */
7091 BTF_ENUM_ENC(NAME_TBD, 0),
7092 BTF_ENUM_ENC(NAME_TBD, 1),
7093 BTF_FWD_ENC(NAME_TBD, 1 /* union kind_flag */), /* [3] fwd */
7094 BTF_TYPE_ARRAY_ENC(2, 1, 7), /* [4] array */
7095 BTF_STRUCT_ENC(NAME_TBD, 1, 4), /* [5] struct */
7096 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
7097 BTF_UNION_ENC(NAME_TBD, 1, 4), /* [6] union */
7098 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
7099 BTF_TYPEDEF_ENC(NAME_TBD, 1), /* [7] typedef */
7100 BTF_PTR_ENC(0), /* [8] ptr */
7101 BTF_CONST_ENC(8), /* [9] const */
7102 BTF_VOLATILE_ENC(8), /* [10] volatile */
7103 BTF_RESTRICT_ENC(8), /* [11] restrict */
7104 BTF_FUNC_PROTO_ENC(1, 2), /* [12] func_proto */
7105 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
7106 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 18),
7107 BTF_FUNC_ENC(NAME_TBD, 12), /* [13] func */
7108 BTF_TYPE_FLOAT_ENC(NAME_TBD, 2), /* [14] float */
7109 BTF_DECL_TAG_ENC(NAME_TBD, 13, -1), /* [15] decl_tag */
7110 BTF_DECL_TAG_ENC(NAME_TBD, 13, 1), /* [16] decl_tag */
7111 BTF_DECL_TAG_ENC(NAME_TBD, 7, -1), /* [17] decl_tag */
7112 BTF_TYPE_TAG_ENC(NAME_TBD, 8), /* [18] type_tag */
7113 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 2), 8), /* [19] enum64 */
7114 BTF_ENUM64_ENC(NAME_TBD, 0, 0),
7115 BTF_ENUM64_ENC(NAME_TBD, 1, 1),
7118 BTF_STR_SEC("\0A\0B\0C\0D\0E\0F\0G\0H\0I\0J\0K\0L\0M\0N\0O\0P\0Q\0R\0S\0T\0U"),
7122 BTF_TYPE_INT_ENC(NAME_TBD, BTF_INT_SIGNED, 0, 32, 8), /* [1] int */
7123 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_ENUM, 0, 2), 4), /* [2] enum */
7124 BTF_ENUM_ENC(NAME_TBD, 0),
7125 BTF_ENUM_ENC(NAME_TBD, 1),
7126 BTF_FWD_ENC(NAME_TBD, 1 /* union kind_flag */), /* [3] fwd */
7127 BTF_TYPE_ARRAY_ENC(2, 1, 7), /* [4] array */
7128 BTF_STRUCT_ENC(NAME_TBD, 1, 4), /* [5] struct */
7129 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
7130 BTF_UNION_ENC(NAME_TBD, 1, 4), /* [6] union */
7131 BTF_MEMBER_ENC(NAME_TBD, 1, 0),
7132 BTF_TYPEDEF_ENC(NAME_TBD, 1), /* [7] typedef */
7133 BTF_PTR_ENC(0), /* [8] ptr */
7134 BTF_CONST_ENC(8), /* [9] const */
7135 BTF_VOLATILE_ENC(8), /* [10] volatile */
7136 BTF_RESTRICT_ENC(8), /* [11] restrict */
7137 BTF_FUNC_PROTO_ENC(1, 2), /* [12] func_proto */
7138 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 1),
7139 BTF_FUNC_PROTO_ARG_ENC(NAME_TBD, 18),
7140 BTF_FUNC_ENC(NAME_TBD, 12), /* [13] func */
7141 BTF_TYPE_FLOAT_ENC(NAME_TBD, 2), /* [14] float */
7142 BTF_DECL_TAG_ENC(NAME_TBD, 13, -1), /* [15] decl_tag */
7143 BTF_DECL_TAG_ENC(NAME_TBD, 13, 1), /* [16] decl_tag */
7144 BTF_DECL_TAG_ENC(NAME_TBD, 7, -1), /* [17] decl_tag */
7145 BTF_TYPE_TAG_ENC(NAME_TBD, 8), /* [18] type_tag */
7146 BTF_TYPE_ENC(NAME_TBD, BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 2), 8), /* [19] enum64 */
7147 BTF_ENUM64_ENC(NAME_TBD, 0, 0),
7148 BTF_ENUM64_ENC(NAME_TBD, 1, 1),
7151 BTF_STR_SEC("\0A\0B\0C\0D\0E\0F\0G\0H\0I\0J\0K\0L\0M\0N\0O\0P\0Q\0R\0S\0T\0U"),
7155 .descr = "dedup: no int/float duplicates",
7158 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_SIGNED, 0, 32, 8),
7159 /* different name */
7160 BTF_TYPE_INT_ENC(NAME_NTH(2), BTF_INT_SIGNED, 0, 32, 8),
7161 /* different encoding */
7162 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_CHAR, 0, 32, 8),
7163 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_BOOL, 0, 32, 8),
7164 /* different bit offset */
7165 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_SIGNED, 8, 32, 8),
7166 /* different bit size */
7167 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_SIGNED, 0, 27, 8),
7168 /* different byte size */
7169 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_SIGNED, 0, 32, 4),
7170 /* all allowed sizes */
7171 BTF_TYPE_FLOAT_ENC(NAME_NTH(3), 2),
7172 BTF_TYPE_FLOAT_ENC(NAME_NTH(3), 4),
7173 BTF_TYPE_FLOAT_ENC(NAME_NTH(3), 8),
7174 BTF_TYPE_FLOAT_ENC(NAME_NTH(3), 12),
7175 BTF_TYPE_FLOAT_ENC(NAME_NTH(3), 16),
7178 BTF_STR_SEC("\0int\0some other int\0float"),
7182 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_SIGNED, 0, 32, 8),
7183 /* different name */
7184 BTF_TYPE_INT_ENC(NAME_NTH(2), BTF_INT_SIGNED, 0, 32, 8),
7185 /* different encoding */
7186 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_CHAR, 0, 32, 8),
7187 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_BOOL, 0, 32, 8),
7188 /* different bit offset */
7189 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_SIGNED, 8, 32, 8),
7190 /* different bit size */
7191 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_SIGNED, 0, 27, 8),
7192 /* different byte size */
7193 BTF_TYPE_INT_ENC(NAME_NTH(1), BTF_INT_SIGNED, 0, 32, 4),
7194 /* all allowed sizes */
7195 BTF_TYPE_FLOAT_ENC(NAME_NTH(3), 2),
7196 BTF_TYPE_FLOAT_ENC(NAME_NTH(3), 4),
7197 BTF_TYPE_FLOAT_ENC(NAME_NTH(3), 8),
7198 BTF_TYPE_FLOAT_ENC(NAME_NTH(3), 12),
7199 BTF_TYPE_FLOAT_ENC(NAME_NTH(3), 16),
7202 BTF_STR_SEC("\0int\0some other int\0float"),
7206 .descr = "dedup: enum fwd resolution",
7209 /* [1] fwd enum 'e1' before full enum */
7210 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 0), 4),
7211 /* [2] full enum 'e1' after fwd */
7212 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4),
7213 BTF_ENUM_ENC(NAME_NTH(2), 123),
7214 /* [3] full enum 'e2' before fwd */
7215 BTF_TYPE_ENC(NAME_NTH(3), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4),
7216 BTF_ENUM_ENC(NAME_NTH(4), 456),
7217 /* [4] fwd enum 'e2' after full enum */
7218 BTF_TYPE_ENC(NAME_NTH(3), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 0), 4),
7219 /* [5] fwd enum with different size, size does not matter for fwd */
7220 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 0), 1),
7221 /* [6] incompatible full enum with different value */
7222 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4),
7223 BTF_ENUM_ENC(NAME_NTH(2), 321),
7226 BTF_STR_SEC("\0e1\0e1_val\0e2\0e2_val"),
7230 /* [1] full enum 'e1' */
7231 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4),
7232 BTF_ENUM_ENC(NAME_NTH(2), 123),
7233 /* [2] full enum 'e2' */
7234 BTF_TYPE_ENC(NAME_NTH(3), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4),
7235 BTF_ENUM_ENC(NAME_NTH(4), 456),
7236 /* [3] incompatible full enum with different value */
7237 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4),
7238 BTF_ENUM_ENC(NAME_NTH(2), 321),
7241 BTF_STR_SEC("\0e1\0e1_val\0e2\0e2_val"),
7245 .descr = "dedup: datasec and vars pass-through",
7249 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7251 BTF_VAR_ENC(NAME_NTH(2), 1, 0), /* [2] */
7252 /* .bss section */ /* [3] */
7253 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
7254 BTF_VAR_SECINFO_ENC(2, 0, 4),
7255 /* int, referenced from [5] */
7256 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [4] */
7257 /* another static int t */
7258 BTF_VAR_ENC(NAME_NTH(2), 4, 0), /* [5] */
7259 /* another .bss section */ /* [6] */
7260 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
7261 BTF_VAR_SECINFO_ENC(5, 0, 4),
7264 BTF_STR_SEC("\0.bss\0t"),
7269 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7271 BTF_VAR_ENC(NAME_NTH(2), 1, 0), /* [2] */
7272 /* .bss section */ /* [3] */
7273 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
7274 BTF_VAR_SECINFO_ENC(2, 0, 4),
7275 /* another static int t */
7276 BTF_VAR_ENC(NAME_NTH(2), 1, 0), /* [4] */
7277 /* another .bss section */ /* [5] */
7278 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_DATASEC, 0, 1), 4),
7279 BTF_VAR_SECINFO_ENC(4, 0, 4),
7282 BTF_STR_SEC("\0.bss\0t"),
7285 .force_collisions = true
7289 .descr = "dedup: func/func_arg/var tags",
7293 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7295 BTF_VAR_ENC(NAME_NTH(1), 1, 0), /* [2] */
7296 /* void f(int a1, int a2) */
7297 BTF_FUNC_PROTO_ENC(0, 2), /* [3] */
7298 BTF_FUNC_PROTO_ARG_ENC(NAME_NTH(2), 1),
7299 BTF_FUNC_PROTO_ARG_ENC(NAME_NTH(3), 1),
7300 BTF_FUNC_ENC(NAME_NTH(4), 2), /* [4] */
7302 BTF_DECL_TAG_ENC(NAME_NTH(5), 2, -1), /* [5] */
7303 BTF_DECL_TAG_ENC(NAME_NTH(5), 2, -1), /* [6] */
7305 BTF_DECL_TAG_ENC(NAME_NTH(5), 4, -1), /* [7] */
7306 BTF_DECL_TAG_ENC(NAME_NTH(5), 4, -1), /* [8] */
7307 /* tag -> func arg a1 */
7308 BTF_DECL_TAG_ENC(NAME_NTH(5), 4, 1), /* [9] */
7309 BTF_DECL_TAG_ENC(NAME_NTH(5), 4, 1), /* [10] */
7312 BTF_STR_SEC("\0t\0a1\0a2\0f\0tag"),
7316 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7317 BTF_VAR_ENC(NAME_NTH(1), 1, 0), /* [2] */
7318 BTF_FUNC_PROTO_ENC(0, 2), /* [3] */
7319 BTF_FUNC_PROTO_ARG_ENC(NAME_NTH(2), 1),
7320 BTF_FUNC_PROTO_ARG_ENC(NAME_NTH(3), 1),
7321 BTF_FUNC_ENC(NAME_NTH(4), 2), /* [4] */
7322 BTF_DECL_TAG_ENC(NAME_NTH(5), 2, -1), /* [5] */
7323 BTF_DECL_TAG_ENC(NAME_NTH(5), 4, -1), /* [6] */
7324 BTF_DECL_TAG_ENC(NAME_NTH(5), 4, 1), /* [7] */
7327 BTF_STR_SEC("\0t\0a1\0a2\0f\0tag"),
7331 .descr = "dedup: func/func_param tags",
7335 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7336 /* void f(int a1, int a2) */
7337 BTF_FUNC_PROTO_ENC(0, 2), /* [2] */
7338 BTF_FUNC_PROTO_ARG_ENC(NAME_NTH(1), 1),
7339 BTF_FUNC_PROTO_ARG_ENC(NAME_NTH(2), 1),
7340 BTF_FUNC_ENC(NAME_NTH(3), 2), /* [3] */
7341 /* void f(int a1, int a2) */
7342 BTF_FUNC_PROTO_ENC(0, 2), /* [4] */
7343 BTF_FUNC_PROTO_ARG_ENC(NAME_NTH(1), 1),
7344 BTF_FUNC_PROTO_ARG_ENC(NAME_NTH(2), 1),
7345 BTF_FUNC_ENC(NAME_NTH(3), 4), /* [5] */
7346 /* tag -> f: tag1, tag2 */
7347 BTF_DECL_TAG_ENC(NAME_NTH(4), 3, -1), /* [6] */
7348 BTF_DECL_TAG_ENC(NAME_NTH(5), 3, -1), /* [7] */
7349 /* tag -> f/a2: tag1, tag2 */
7350 BTF_DECL_TAG_ENC(NAME_NTH(4), 3, 1), /* [8] */
7351 BTF_DECL_TAG_ENC(NAME_NTH(5), 3, 1), /* [9] */
7352 /* tag -> f: tag1, tag3 */
7353 BTF_DECL_TAG_ENC(NAME_NTH(4), 5, -1), /* [10] */
7354 BTF_DECL_TAG_ENC(NAME_NTH(6), 5, -1), /* [11] */
7355 /* tag -> f/a2: tag1, tag3 */
7356 BTF_DECL_TAG_ENC(NAME_NTH(4), 5, 1), /* [12] */
7357 BTF_DECL_TAG_ENC(NAME_NTH(6), 5, 1), /* [13] */
7360 BTF_STR_SEC("\0a1\0a2\0f\0tag1\0tag2\0tag3"),
7364 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7365 BTF_FUNC_PROTO_ENC(0, 2), /* [2] */
7366 BTF_FUNC_PROTO_ARG_ENC(NAME_NTH(1), 1),
7367 BTF_FUNC_PROTO_ARG_ENC(NAME_NTH(2), 1),
7368 BTF_FUNC_ENC(NAME_NTH(3), 2), /* [3] */
7369 BTF_DECL_TAG_ENC(NAME_NTH(4), 3, -1), /* [4] */
7370 BTF_DECL_TAG_ENC(NAME_NTH(5), 3, -1), /* [5] */
7371 BTF_DECL_TAG_ENC(NAME_NTH(6), 3, -1), /* [6] */
7372 BTF_DECL_TAG_ENC(NAME_NTH(4), 3, 1), /* [7] */
7373 BTF_DECL_TAG_ENC(NAME_NTH(5), 3, 1), /* [8] */
7374 BTF_DECL_TAG_ENC(NAME_NTH(6), 3, 1), /* [9] */
7377 BTF_STR_SEC("\0a1\0a2\0f\0tag1\0tag2\0tag3"),
7381 .descr = "dedup: struct/struct_member tags",
7385 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7386 BTF_STRUCT_ENC(NAME_NTH(1), 2, 8), /* [2] */
7387 BTF_MEMBER_ENC(NAME_NTH(2), 1, 0),
7388 BTF_MEMBER_ENC(NAME_NTH(3), 1, 32),
7389 BTF_STRUCT_ENC(NAME_NTH(1), 2, 8), /* [3] */
7390 BTF_MEMBER_ENC(NAME_NTH(2), 1, 0),
7391 BTF_MEMBER_ENC(NAME_NTH(3), 1, 32),
7392 /* tag -> t: tag1, tag2 */
7393 BTF_DECL_TAG_ENC(NAME_NTH(4), 2, -1), /* [4] */
7394 BTF_DECL_TAG_ENC(NAME_NTH(5), 2, -1), /* [5] */
7395 /* tag -> t/m2: tag1, tag2 */
7396 BTF_DECL_TAG_ENC(NAME_NTH(4), 2, 1), /* [6] */
7397 BTF_DECL_TAG_ENC(NAME_NTH(5), 2, 1), /* [7] */
7398 /* tag -> t: tag1, tag3 */
7399 BTF_DECL_TAG_ENC(NAME_NTH(4), 3, -1), /* [8] */
7400 BTF_DECL_TAG_ENC(NAME_NTH(6), 3, -1), /* [9] */
7401 /* tag -> t/m2: tag1, tag3 */
7402 BTF_DECL_TAG_ENC(NAME_NTH(4), 3, 1), /* [10] */
7403 BTF_DECL_TAG_ENC(NAME_NTH(6), 3, 1), /* [11] */
7406 BTF_STR_SEC("\0t\0m1\0m2\0tag1\0tag2\0tag3"),
7410 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7411 BTF_STRUCT_ENC(NAME_NTH(1), 2, 8), /* [2] */
7412 BTF_MEMBER_ENC(NAME_NTH(2), 1, 0),
7413 BTF_MEMBER_ENC(NAME_NTH(3), 1, 32),
7414 BTF_DECL_TAG_ENC(NAME_NTH(4), 2, -1), /* [3] */
7415 BTF_DECL_TAG_ENC(NAME_NTH(5), 2, -1), /* [4] */
7416 BTF_DECL_TAG_ENC(NAME_NTH(6), 2, -1), /* [5] */
7417 BTF_DECL_TAG_ENC(NAME_NTH(4), 2, 1), /* [6] */
7418 BTF_DECL_TAG_ENC(NAME_NTH(5), 2, 1), /* [7] */
7419 BTF_DECL_TAG_ENC(NAME_NTH(6), 2, 1), /* [8] */
7422 BTF_STR_SEC("\0t\0m1\0m2\0tag1\0tag2\0tag3"),
7426 .descr = "dedup: typedef tags",
7430 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7431 BTF_TYPEDEF_ENC(NAME_NTH(1), 1), /* [2] */
7432 BTF_TYPEDEF_ENC(NAME_NTH(1), 1), /* [3] */
7433 /* tag -> t: tag1, tag2 */
7434 BTF_DECL_TAG_ENC(NAME_NTH(2), 2, -1), /* [4] */
7435 BTF_DECL_TAG_ENC(NAME_NTH(3), 2, -1), /* [5] */
7436 /* tag -> t: tag1, tag3 */
7437 BTF_DECL_TAG_ENC(NAME_NTH(2), 3, -1), /* [6] */
7438 BTF_DECL_TAG_ENC(NAME_NTH(4), 3, -1), /* [7] */
7441 BTF_STR_SEC("\0t\0tag1\0tag2\0tag3"),
7445 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7446 BTF_TYPEDEF_ENC(NAME_NTH(1), 1), /* [2] */
7447 BTF_DECL_TAG_ENC(NAME_NTH(2), 2, -1), /* [3] */
7448 BTF_DECL_TAG_ENC(NAME_NTH(3), 2, -1), /* [4] */
7449 BTF_DECL_TAG_ENC(NAME_NTH(4), 2, -1), /* [5] */
7452 BTF_STR_SEC("\0t\0tag1\0tag2\0tag3"),
7456 .descr = "dedup: btf_type_tag #1",
7459 /* ptr -> tag2 -> tag1 -> int */
7460 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7461 BTF_TYPE_TAG_ENC(NAME_NTH(1), 1), /* [2] */
7462 BTF_TYPE_TAG_ENC(NAME_NTH(2), 2), /* [3] */
7463 BTF_PTR_ENC(3), /* [4] */
7464 /* ptr -> tag2 -> tag1 -> int */
7465 BTF_TYPE_TAG_ENC(NAME_NTH(1), 1), /* [5] */
7466 BTF_TYPE_TAG_ENC(NAME_NTH(2), 5), /* [6] */
7467 BTF_PTR_ENC(6), /* [7] */
7468 /* ptr -> tag1 -> int */
7469 BTF_TYPE_TAG_ENC(NAME_NTH(1), 1), /* [8] */
7470 BTF_PTR_ENC(8), /* [9] */
7473 BTF_STR_SEC("\0tag1\0tag2"),
7477 /* ptr -> tag2 -> tag1 -> int */
7478 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7479 BTF_TYPE_TAG_ENC(NAME_NTH(1), 1), /* [2] */
7480 BTF_TYPE_TAG_ENC(NAME_NTH(2), 2), /* [3] */
7481 BTF_PTR_ENC(3), /* [4] */
7482 /* ptr -> tag1 -> int */
7483 BTF_PTR_ENC(2), /* [5] */
7486 BTF_STR_SEC("\0tag1\0tag2"),
7490 .descr = "dedup: btf_type_tag #2",
7493 /* ptr -> tag2 -> tag1 -> int */
7494 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7495 BTF_TYPE_TAG_ENC(NAME_NTH(1), 1), /* [2] */
7496 BTF_TYPE_TAG_ENC(NAME_NTH(2), 2), /* [3] */
7497 BTF_PTR_ENC(3), /* [4] */
7498 /* ptr -> tag2 -> int */
7499 BTF_TYPE_TAG_ENC(NAME_NTH(2), 1), /* [5] */
7500 BTF_PTR_ENC(5), /* [6] */
7503 BTF_STR_SEC("\0tag1\0tag2"),
7507 /* ptr -> tag2 -> tag1 -> int */
7508 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7509 BTF_TYPE_TAG_ENC(NAME_NTH(1), 1), /* [2] */
7510 BTF_TYPE_TAG_ENC(NAME_NTH(2), 2), /* [3] */
7511 BTF_PTR_ENC(3), /* [4] */
7512 /* ptr -> tag2 -> int */
7513 BTF_TYPE_TAG_ENC(NAME_NTH(2), 1), /* [5] */
7514 BTF_PTR_ENC(5), /* [6] */
7517 BTF_STR_SEC("\0tag1\0tag2"),
7521 .descr = "dedup: btf_type_tag #3",
7524 /* ptr -> tag2 -> tag1 -> int */
7525 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7526 BTF_TYPE_TAG_ENC(NAME_NTH(1), 1), /* [2] */
7527 BTF_TYPE_TAG_ENC(NAME_NTH(2), 2), /* [3] */
7528 BTF_PTR_ENC(3), /* [4] */
7529 /* ptr -> tag1 -> tag2 -> int */
7530 BTF_TYPE_TAG_ENC(NAME_NTH(2), 1), /* [5] */
7531 BTF_TYPE_TAG_ENC(NAME_NTH(1), 5), /* [6] */
7532 BTF_PTR_ENC(6), /* [7] */
7535 BTF_STR_SEC("\0tag1\0tag2"),
7539 /* ptr -> tag2 -> tag1 -> int */
7540 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7541 BTF_TYPE_TAG_ENC(NAME_NTH(1), 1), /* [2] */
7542 BTF_TYPE_TAG_ENC(NAME_NTH(2), 2), /* [3] */
7543 BTF_PTR_ENC(3), /* [4] */
7544 /* ptr -> tag1 -> tag2 -> int */
7545 BTF_TYPE_TAG_ENC(NAME_NTH(2), 1), /* [5] */
7546 BTF_TYPE_TAG_ENC(NAME_NTH(1), 5), /* [6] */
7547 BTF_PTR_ENC(6), /* [7] */
7550 BTF_STR_SEC("\0tag1\0tag2"),
7554 .descr = "dedup: btf_type_tag #4",
7557 /* ptr -> tag1 -> int */
7558 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7559 BTF_TYPE_TAG_ENC(NAME_NTH(1), 1), /* [2] */
7560 BTF_PTR_ENC(2), /* [3] */
7561 /* ptr -> tag1 -> long */
7562 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 64, 8), /* [4] */
7563 BTF_TYPE_TAG_ENC(NAME_NTH(1), 4), /* [5] */
7564 BTF_PTR_ENC(5), /* [6] */
7567 BTF_STR_SEC("\0tag1"),
7571 /* ptr -> tag1 -> int */
7572 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7573 BTF_TYPE_TAG_ENC(NAME_NTH(1), 1), /* [2] */
7574 BTF_PTR_ENC(2), /* [3] */
7575 /* ptr -> tag1 -> long */
7576 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 64, 8), /* [4] */
7577 BTF_TYPE_TAG_ENC(NAME_NTH(1), 4), /* [5] */
7578 BTF_PTR_ENC(5), /* [6] */
7581 BTF_STR_SEC("\0tag1"),
7585 .descr = "dedup: btf_type_tag #5, struct",
7588 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7589 BTF_TYPE_TAG_ENC(NAME_NTH(1), 1), /* [2] */
7590 BTF_TYPE_ENC(NAME_NTH(2), BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 1), 4), /* [3] */
7591 BTF_MEMBER_ENC(NAME_NTH(3), 2, BTF_MEMBER_OFFSET(0, 0)),
7592 BTF_TYPE_TAG_ENC(NAME_NTH(1), 1), /* [4] */
7593 BTF_TYPE_ENC(NAME_NTH(2), BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 1), 4), /* [5] */
7594 BTF_MEMBER_ENC(NAME_NTH(3), 4, BTF_MEMBER_OFFSET(0, 0)),
7597 BTF_STR_SEC("\0tag1\0t\0m"),
7601 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [1] */
7602 BTF_TYPE_TAG_ENC(NAME_NTH(1), 1), /* [2] */
7603 BTF_TYPE_ENC(NAME_NTH(2), BTF_INFO_ENC(BTF_KIND_STRUCT, 1, 1), 4), /* [3] */
7604 BTF_MEMBER_ENC(NAME_NTH(3), 2, BTF_MEMBER_OFFSET(0, 0)),
7607 BTF_STR_SEC("\0tag1\0t\0m"),
7611 .descr = "dedup: enum64, standalone",
7614 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 1), 8),
7615 BTF_ENUM64_ENC(NAME_NTH(2), 1, 123),
7616 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 1), 8),
7617 BTF_ENUM64_ENC(NAME_NTH(2), 1, 123),
7620 BTF_STR_SEC("\0e1\0e1_val"),
7624 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 1), 8),
7625 BTF_ENUM64_ENC(NAME_NTH(2), 1, 123),
7628 BTF_STR_SEC("\0e1\0e1_val"),
7632 .descr = "dedup: enum64, fwd resolution",
7635 /* [1] fwd enum64 'e1' before full enum */
7636 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 0), 8),
7637 /* [2] full enum64 'e1' after fwd */
7638 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 1), 8),
7639 BTF_ENUM64_ENC(NAME_NTH(2), 1, 123),
7640 /* [3] full enum64 'e2' before fwd */
7641 BTF_TYPE_ENC(NAME_NTH(3), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 1), 8),
7642 BTF_ENUM64_ENC(NAME_NTH(4), 0, 456),
7643 /* [4] fwd enum64 'e2' after full enum */
7644 BTF_TYPE_ENC(NAME_NTH(3), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 0), 8),
7645 /* [5] incompatible full enum64 with different value */
7646 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 1), 8),
7647 BTF_ENUM64_ENC(NAME_NTH(2), 0, 321),
7650 BTF_STR_SEC("\0e1\0e1_val\0e2\0e2_val"),
7654 /* [1] full enum64 'e1' */
7655 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 1), 8),
7656 BTF_ENUM64_ENC(NAME_NTH(2), 1, 123),
7657 /* [2] full enum64 'e2' */
7658 BTF_TYPE_ENC(NAME_NTH(3), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 1), 8),
7659 BTF_ENUM64_ENC(NAME_NTH(4), 0, 456),
7660 /* [3] incompatible full enum64 with different value */
7661 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 1), 8),
7662 BTF_ENUM64_ENC(NAME_NTH(2), 0, 321),
7665 BTF_STR_SEC("\0e1\0e1_val\0e2\0e2_val"),
7669 .descr = "dedup: enum and enum64, no dedup",
7673 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4),
7674 BTF_ENUM_ENC(NAME_NTH(2), 1),
7675 /* [2] enum64 'e1' */
7676 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 1), 4),
7677 BTF_ENUM64_ENC(NAME_NTH(2), 1, 0),
7680 BTF_STR_SEC("\0e1\0e1_val"),
7685 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4),
7686 BTF_ENUM_ENC(NAME_NTH(2), 1),
7687 /* [2] enum64 'e1' */
7688 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 1), 4),
7689 BTF_ENUM64_ENC(NAME_NTH(2), 1, 0),
7692 BTF_STR_SEC("\0e1\0e1_val"),
7696 .descr = "dedup: enum of different size: no dedup",
7700 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4),
7701 BTF_ENUM_ENC(NAME_NTH(2), 1),
7703 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 2),
7704 BTF_ENUM_ENC(NAME_NTH(2), 1),
7707 BTF_STR_SEC("\0e1\0e1_val"),
7712 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4),
7713 BTF_ENUM_ENC(NAME_NTH(2), 1),
7715 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 2),
7716 BTF_ENUM_ENC(NAME_NTH(2), 1),
7719 BTF_STR_SEC("\0e1\0e1_val"),
7723 .descr = "dedup: enum fwd to enum64",
7726 /* [1] enum64 'e1' */
7727 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 1), 8),
7728 BTF_ENUM64_ENC(NAME_NTH(2), 1, 0),
7729 /* [2] enum 'e1' fwd */
7730 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 0), 4),
7731 /* [3] typedef enum 'e1' td */
7732 BTF_TYPE_ENC(NAME_NTH(3), BTF_INFO_ENC(BTF_KIND_TYPEDEF, 0, 0), 2),
7735 BTF_STR_SEC("\0e1\0e1_val\0td"),
7739 /* [1] enum64 'e1' */
7740 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 1), 8),
7741 BTF_ENUM64_ENC(NAME_NTH(2), 1, 0),
7742 /* [2] typedef enum 'e1' td */
7743 BTF_TYPE_ENC(NAME_NTH(3), BTF_INFO_ENC(BTF_KIND_TYPEDEF, 0, 0), 1),
7746 BTF_STR_SEC("\0e1\0e1_val\0td"),
7750 .descr = "dedup: enum64 fwd to enum",
7754 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4),
7755 BTF_ENUM_ENC(NAME_NTH(2), 1),
7756 /* [2] enum64 'e1' fwd */
7757 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM64, 0, 0), 8),
7758 /* [3] typedef enum 'e1' td */
7759 BTF_TYPE_ENC(NAME_NTH(3), BTF_INFO_ENC(BTF_KIND_TYPEDEF, 0, 0), 2),
7762 BTF_STR_SEC("\0e1\0e1_val\0td"),
7767 BTF_TYPE_ENC(NAME_NTH(1), BTF_INFO_ENC(BTF_KIND_ENUM, 0, 1), 4),
7768 BTF_ENUM_ENC(NAME_NTH(2), 1),
7769 /* [2] typedef enum 'e1' td */
7770 BTF_TYPE_ENC(NAME_NTH(3), BTF_INFO_ENC(BTF_KIND_TYPEDEF, 0, 0), 1),
7773 BTF_STR_SEC("\0e1\0e1_val\0td"),
7777 .descr = "dedup: standalone fwd declaration struct",
7779 * Verify that CU1:foo and CU2:foo would be unified and that
7780 * typedef/ptr would be updated to point to CU1:foo.
7783 * struct foo { int x; };
7787 * typedef struct foo *foo_ptr;
7792 BTF_STRUCT_ENC(NAME_NTH(1), 1, 4), /* [1] */
7793 BTF_MEMBER_ENC(NAME_NTH(2), 2, 0),
7794 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [2] */
7796 BTF_FWD_ENC(NAME_NTH(1), 0), /* [3] */
7797 BTF_PTR_ENC(3), /* [4] */
7798 BTF_TYPEDEF_ENC(NAME_NTH(3), 4), /* [5] */
7801 BTF_STR_SEC("\0foo\0x\0foo_ptr"),
7805 BTF_STRUCT_ENC(NAME_NTH(1), 1, 4), /* [1] */
7806 BTF_MEMBER_ENC(NAME_NTH(2), 2, 0),
7807 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [2] */
7808 BTF_PTR_ENC(1), /* [3] */
7809 BTF_TYPEDEF_ENC(NAME_NTH(3), 3), /* [4] */
7812 BTF_STR_SEC("\0foo\0x\0foo_ptr"),
7816 .descr = "dedup: standalone fwd declaration union",
7818 * Verify that CU1:foo and CU2:foo would be unified and that
7819 * typedef/ptr would be updated to point to CU1:foo.
7820 * Same as "dedup: standalone fwd declaration struct" but for unions.
7823 * union foo { int x; };
7827 * typedef union foo *foo_ptr;
7832 BTF_UNION_ENC(NAME_NTH(1), 1, 4), /* [1] */
7833 BTF_MEMBER_ENC(NAME_NTH(2), 2, 0),
7834 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [2] */
7836 BTF_FWD_ENC(NAME_TBD, 1), /* [3] */
7837 BTF_PTR_ENC(3), /* [4] */
7838 BTF_TYPEDEF_ENC(NAME_NTH(3), 4), /* [5] */
7841 BTF_STR_SEC("\0foo\0x\0foo_ptr"),
7845 BTF_UNION_ENC(NAME_NTH(1), 1, 4), /* [1] */
7846 BTF_MEMBER_ENC(NAME_NTH(2), 2, 0),
7847 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [2] */
7848 BTF_PTR_ENC(1), /* [3] */
7849 BTF_TYPEDEF_ENC(NAME_NTH(3), 3), /* [4] */
7852 BTF_STR_SEC("\0foo\0x\0foo_ptr"),
7856 .descr = "dedup: standalone fwd declaration wrong kind",
7858 * Negative test for btf_dedup_resolve_fwds:
7859 * - CU1:foo is a struct, C2:foo is a union, thus CU2:foo is not deduped;
7860 * - typedef/ptr should remain unchanged as well.
7863 * struct foo { int x; };
7867 * typedef union foo *foo_ptr;
7872 BTF_STRUCT_ENC(NAME_NTH(1), 1, 4), /* [1] */
7873 BTF_MEMBER_ENC(NAME_NTH(2), 2, 0),
7874 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [2] */
7876 BTF_FWD_ENC(NAME_NTH(3), 1), /* [3] */
7877 BTF_PTR_ENC(3), /* [4] */
7878 BTF_TYPEDEF_ENC(NAME_NTH(3), 4), /* [5] */
7881 BTF_STR_SEC("\0foo\0x\0foo_ptr"),
7886 BTF_STRUCT_ENC(NAME_NTH(1), 1, 4), /* [1] */
7887 BTF_MEMBER_ENC(NAME_NTH(2), 2, 0),
7888 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [2] */
7890 BTF_FWD_ENC(NAME_NTH(3), 1), /* [3] */
7891 BTF_PTR_ENC(3), /* [4] */
7892 BTF_TYPEDEF_ENC(NAME_NTH(3), 4), /* [5] */
7895 BTF_STR_SEC("\0foo\0x\0foo_ptr"),
7899 .descr = "dedup: standalone fwd declaration name conflict",
7901 * Negative test for btf_dedup_resolve_fwds:
7902 * - two candidates for CU2:foo dedup, thus it is unchanged;
7903 * - typedef/ptr should remain unchanged as well.
7906 * struct foo { int x; };
7910 * typedef struct foo *foo_ptr;
7913 * struct foo { int x; int y; };
7918 BTF_STRUCT_ENC(NAME_NTH(1), 1, 4), /* [1] */
7919 BTF_MEMBER_ENC(NAME_NTH(2), 2, 0),
7920 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [2] */
7922 BTF_FWD_ENC(NAME_NTH(1), 0), /* [3] */
7923 BTF_PTR_ENC(3), /* [4] */
7924 BTF_TYPEDEF_ENC(NAME_NTH(4), 4), /* [5] */
7926 BTF_STRUCT_ENC(NAME_NTH(1), 2, 8), /* [6] */
7927 BTF_MEMBER_ENC(NAME_NTH(2), 2, 0),
7928 BTF_MEMBER_ENC(NAME_NTH(3), 2, 0),
7931 BTF_STR_SEC("\0foo\0x\0y\0foo_ptr"),
7936 BTF_STRUCT_ENC(NAME_NTH(1), 1, 4), /* [1] */
7937 BTF_MEMBER_ENC(NAME_NTH(2), 2, 0),
7938 BTF_TYPE_INT_ENC(0, BTF_INT_SIGNED, 0, 32, 4), /* [2] */
7940 BTF_FWD_ENC(NAME_NTH(1), 0), /* [3] */
7941 BTF_PTR_ENC(3), /* [4] */
7942 BTF_TYPEDEF_ENC(NAME_NTH(4), 4), /* [5] */
7944 BTF_STRUCT_ENC(NAME_NTH(1), 2, 8), /* [6] */
7945 BTF_MEMBER_ENC(NAME_NTH(2), 2, 0),
7946 BTF_MEMBER_ENC(NAME_NTH(3), 2, 0),
7949 BTF_STR_SEC("\0foo\0x\0y\0foo_ptr"),
7954 static int btf_type_size(const struct btf_type *t)
7956 int base_size = sizeof(struct btf_type);
7957 __u16 vlen = BTF_INFO_VLEN(t->info);
7958 __u16 kind = BTF_INFO_KIND(t->info);
7962 case BTF_KIND_CONST:
7963 case BTF_KIND_VOLATILE:
7964 case BTF_KIND_RESTRICT:
7966 case BTF_KIND_TYPEDEF:
7968 case BTF_KIND_FLOAT:
7969 case BTF_KIND_TYPE_TAG:
7972 return base_size + sizeof(__u32);
7974 return base_size + vlen * sizeof(struct btf_enum);
7975 case BTF_KIND_ENUM64:
7976 return base_size + vlen * sizeof(struct btf_enum64);
7977 case BTF_KIND_ARRAY:
7978 return base_size + sizeof(struct btf_array);
7979 case BTF_KIND_STRUCT:
7980 case BTF_KIND_UNION:
7981 return base_size + vlen * sizeof(struct btf_member);
7982 case BTF_KIND_FUNC_PROTO:
7983 return base_size + vlen * sizeof(struct btf_param);
7985 return base_size + sizeof(struct btf_var);
7986 case BTF_KIND_DATASEC:
7987 return base_size + vlen * sizeof(struct btf_var_secinfo);
7988 case BTF_KIND_DECL_TAG:
7989 return base_size + sizeof(struct btf_decl_tag);
7991 fprintf(stderr, "Unsupported BTF_KIND:%u\n", kind);
7996 static void dump_btf_strings(const char *strs, __u32 len)
7998 const char *cur = strs;
8001 while (cur < strs + len) {
8002 fprintf(stderr, "string #%d: '%s'\n", i, cur);
8003 cur += strlen(cur) + 1;
8008 static void do_test_dedup(unsigned int test_num)
8010 struct btf_dedup_test *test = &dedup_tests[test_num - 1];
8011 __u32 test_nr_types, expect_nr_types, test_btf_size, expect_btf_size;
8012 const struct btf_header *test_hdr, *expect_hdr;
8013 struct btf *test_btf = NULL, *expect_btf = NULL;
8014 const void *test_btf_data, *expect_btf_data;
8015 const char *ret_test_next_str, *ret_expect_next_str;
8016 const char *test_strs, *expect_strs;
8017 const char *test_str_cur;
8018 const char *expect_str_cur, *expect_str_end;
8019 unsigned int raw_btf_size;
8023 if (!test__start_subtest(test->descr))
8026 raw_btf = btf_raw_create(&hdr_tmpl, test->input.raw_types,
8027 test->input.str_sec, test->input.str_sec_size,
8028 &raw_btf_size, &ret_test_next_str);
8032 test_btf = btf__new((__u8 *)raw_btf, raw_btf_size);
8033 err = libbpf_get_error(test_btf);
8035 if (CHECK(err, "invalid test_btf errno:%d", err)) {
8040 raw_btf = btf_raw_create(&hdr_tmpl, test->expect.raw_types,
8041 test->expect.str_sec,
8042 test->expect.str_sec_size,
8043 &raw_btf_size, &ret_expect_next_str);
8046 expect_btf = btf__new((__u8 *)raw_btf, raw_btf_size);
8047 err = libbpf_get_error(expect_btf);
8049 if (CHECK(err, "invalid expect_btf errno:%d", err)) {
8054 test->opts.sz = sizeof(test->opts);
8055 err = btf__dedup(test_btf, &test->opts);
8056 if (CHECK(err, "btf_dedup failed errno:%d", err)) {
8061 test_btf_data = btf__raw_data(test_btf, &test_btf_size);
8062 expect_btf_data = btf__raw_data(expect_btf, &expect_btf_size);
8063 if (CHECK(test_btf_size != expect_btf_size,
8064 "test_btf_size:%u != expect_btf_size:%u",
8065 test_btf_size, expect_btf_size)) {
8070 test_hdr = test_btf_data;
8071 test_strs = test_btf_data + sizeof(*test_hdr) + test_hdr->str_off;
8072 expect_hdr = expect_btf_data;
8073 expect_strs = expect_btf_data + sizeof(*test_hdr) + expect_hdr->str_off;
8074 if (CHECK(test_hdr->str_len != expect_hdr->str_len,
8075 "test_hdr->str_len:%u != expect_hdr->str_len:%u",
8076 test_hdr->str_len, expect_hdr->str_len)) {
8077 fprintf(stderr, "\ntest strings:\n");
8078 dump_btf_strings(test_strs, test_hdr->str_len);
8079 fprintf(stderr, "\nexpected strings:\n");
8080 dump_btf_strings(expect_strs, expect_hdr->str_len);
8085 expect_str_cur = expect_strs;
8086 expect_str_end = expect_strs + expect_hdr->str_len;
8087 while (expect_str_cur < expect_str_end) {
8088 size_t test_len, expect_len;
8091 off = btf__find_str(test_btf, expect_str_cur);
8092 if (CHECK(off < 0, "exp str '%s' not found: %d\n", expect_str_cur, off)) {
8096 test_str_cur = btf__str_by_offset(test_btf, off);
8098 test_len = strlen(test_str_cur);
8099 expect_len = strlen(expect_str_cur);
8100 if (CHECK(test_len != expect_len,
8101 "test_len:%zu != expect_len:%zu "
8102 "(test_str:%s, expect_str:%s)",
8103 test_len, expect_len, test_str_cur, expect_str_cur)) {
8107 if (CHECK(strcmp(test_str_cur, expect_str_cur),
8108 "test_str:%s != expect_str:%s",
8109 test_str_cur, expect_str_cur)) {
8113 expect_str_cur += expect_len + 1;
8116 test_nr_types = btf__type_cnt(test_btf);
8117 expect_nr_types = btf__type_cnt(expect_btf);
8118 if (CHECK(test_nr_types != expect_nr_types,
8119 "test_nr_types:%u != expect_nr_types:%u",
8120 test_nr_types, expect_nr_types)) {
8125 for (i = 1; i < test_nr_types; i++) {
8126 const struct btf_type *test_type, *expect_type;
8127 int test_size, expect_size;
8129 test_type = btf__type_by_id(test_btf, i);
8130 expect_type = btf__type_by_id(expect_btf, i);
8131 test_size = btf_type_size(test_type);
8132 expect_size = btf_type_size(expect_type);
8134 if (CHECK(test_size != expect_size,
8135 "type #%d: test_size:%d != expect_size:%u",
8136 i, test_size, expect_size)) {
8140 if (CHECK(btf_kind(test_type) != btf_kind(expect_type),
8141 "type %d kind: exp %d != got %u\n",
8142 i, btf_kind(expect_type), btf_kind(test_type))) {
8146 if (CHECK(test_type->info != expect_type->info,
8147 "type %d info: exp %d != got %u\n",
8148 i, expect_type->info, test_type->info)) {
8152 if (CHECK(test_type->size != expect_type->size,
8153 "type %d size/type: exp %d != got %u\n",
8154 i, expect_type->size, test_type->size)) {
8161 btf__free(test_btf);
8162 btf__free(expect_btf);
8169 always_log = env.verbosity > VERBOSE_NONE;
8171 for (i = 1; i <= ARRAY_SIZE(raw_tests); i++)
8173 for (i = 1; i <= ARRAY_SIZE(get_info_tests); i++)
8174 do_test_get_info(i);
8175 for (i = 1; i <= ARRAY_SIZE(file_tests); i++)
8177 for (i = 1; i <= ARRAY_SIZE(info_raw_tests); i++)
8178 do_test_info_raw(i);
8179 for (i = 1; i <= ARRAY_SIZE(dedup_tests); i++)