xref: /openbmc/linux/tools/testing/selftests/bpf/prog_tests/btf_dump.c (revision ea68a3e9d14e9e0bf017d178fb4bd53b6deb1482)
16e05abc9SAndrii Nakryiko // SPDX-License-Identifier: GPL-2.0
26e05abc9SAndrii Nakryiko #include <test_progs.h>
36e05abc9SAndrii Nakryiko #include <bpf/btf.h>
46e05abc9SAndrii Nakryiko 
56e05abc9SAndrii Nakryiko static int duration = 0;
66e05abc9SAndrii Nakryiko 
btf_dump_printf(void * ctx,const char * fmt,va_list args)76e05abc9SAndrii Nakryiko void btf_dump_printf(void *ctx, const char *fmt, va_list args)
86e05abc9SAndrii Nakryiko {
96e05abc9SAndrii Nakryiko 	vfprintf(ctx, fmt, args);
106e05abc9SAndrii Nakryiko }
116e05abc9SAndrii Nakryiko 
126e05abc9SAndrii Nakryiko static struct btf_dump_test_case {
136e05abc9SAndrii Nakryiko 	const char *name;
146e05abc9SAndrii Nakryiko 	const char *file;
15eed7818aSAndrii Nakryiko 	bool known_ptr_sz;
166e05abc9SAndrii Nakryiko } btf_dump_test_cases[] = {
1760ba87bbSAndrii Nakryiko 	{"btf_dump: syntax", "btf_dump_test_case_syntax", true},
1860ba87bbSAndrii Nakryiko 	{"btf_dump: ordering", "btf_dump_test_case_ordering", false},
1960ba87bbSAndrii Nakryiko 	{"btf_dump: padding", "btf_dump_test_case_padding", true},
2060ba87bbSAndrii Nakryiko 	{"btf_dump: packing", "btf_dump_test_case_packing", true},
2160ba87bbSAndrii Nakryiko 	{"btf_dump: bitfields", "btf_dump_test_case_bitfields", true},
2260ba87bbSAndrii Nakryiko 	{"btf_dump: multidim", "btf_dump_test_case_multidim", false},
2360ba87bbSAndrii Nakryiko 	{"btf_dump: namespacing", "btf_dump_test_case_namespacing", false},
246e05abc9SAndrii Nakryiko };
256e05abc9SAndrii Nakryiko 
btf_dump_all_types(const struct btf * btf,void * ctx)2660ba87bbSAndrii Nakryiko static int btf_dump_all_types(const struct btf *btf, void *ctx)
276e05abc9SAndrii Nakryiko {
28487ef148SHengqi Chen 	size_t type_cnt = btf__type_cnt(btf);
296e05abc9SAndrii Nakryiko 	struct btf_dump *d;
306e05abc9SAndrii Nakryiko 	int err = 0, id;
316e05abc9SAndrii Nakryiko 
3260ba87bbSAndrii Nakryiko 	d = btf_dump__new(btf, btf_dump_printf, ctx, NULL);
33bad2e478SAndrii Nakryiko 	err = libbpf_get_error(d);
34bad2e478SAndrii Nakryiko 	if (err)
35bad2e478SAndrii Nakryiko 		return err;
366e05abc9SAndrii Nakryiko 
37487ef148SHengqi Chen 	for (id = 1; id < type_cnt; id++) {
386e05abc9SAndrii Nakryiko 		err = btf_dump__dump_type(d, id);
396e05abc9SAndrii Nakryiko 		if (err)
406e05abc9SAndrii Nakryiko 			goto done;
416e05abc9SAndrii Nakryiko 	}
426e05abc9SAndrii Nakryiko 
436e05abc9SAndrii Nakryiko done:
446e05abc9SAndrii Nakryiko 	btf_dump__free(d);
456e05abc9SAndrii Nakryiko 	return err;
466e05abc9SAndrii Nakryiko }
476e05abc9SAndrii Nakryiko 
test_btf_dump_case(int n,struct btf_dump_test_case * t)486e05abc9SAndrii Nakryiko static int test_btf_dump_case(int n, struct btf_dump_test_case *t)
496e05abc9SAndrii Nakryiko {
506e05abc9SAndrii Nakryiko 	char test_file[256], out_file[256], diff_cmd[1024];
516e05abc9SAndrii Nakryiko 	struct btf *btf = NULL;
526e05abc9SAndrii Nakryiko 	int err = 0, fd = -1;
536e05abc9SAndrii Nakryiko 	FILE *f = NULL;
546e05abc9SAndrii Nakryiko 
55afef88e6SDaniel Müller 	snprintf(test_file, sizeof(test_file), "%s.bpf.o", t->file);
566e05abc9SAndrii Nakryiko 
576e05abc9SAndrii Nakryiko 	btf = btf__parse_elf(test_file, NULL);
58bad2e478SAndrii Nakryiko 	if (!ASSERT_OK_PTR(btf, "btf_parse_elf")) {
596e05abc9SAndrii Nakryiko 		err = -PTR_ERR(btf);
606e05abc9SAndrii Nakryiko 		btf = NULL;
616e05abc9SAndrii Nakryiko 		goto done;
626e05abc9SAndrii Nakryiko 	}
636e05abc9SAndrii Nakryiko 
64eed7818aSAndrii Nakryiko 	/* tests with t->known_ptr_sz have no "long" or "unsigned long" type,
65eed7818aSAndrii Nakryiko 	 * so it's impossible to determine correct pointer size; but if they
66eed7818aSAndrii Nakryiko 	 * do, it should be 8 regardless of host architecture, becaues BPF
67eed7818aSAndrii Nakryiko 	 * target is always 64-bit
68eed7818aSAndrii Nakryiko 	 */
69eed7818aSAndrii Nakryiko 	if (!t->known_ptr_sz) {
70eed7818aSAndrii Nakryiko 		btf__set_pointer_size(btf, 8);
71eed7818aSAndrii Nakryiko 	} else {
72eed7818aSAndrii Nakryiko 		CHECK(btf__pointer_size(btf) != 8, "ptr_sz", "exp %d, got %zu\n",
73eed7818aSAndrii Nakryiko 		      8, btf__pointer_size(btf));
74eed7818aSAndrii Nakryiko 	}
75eed7818aSAndrii Nakryiko 
766e05abc9SAndrii Nakryiko 	snprintf(out_file, sizeof(out_file), "/tmp/%s.output.XXXXXX", t->file);
776e05abc9SAndrii Nakryiko 	fd = mkstemp(out_file);
787a2fa70aSAndrii Nakryiko 	if (!ASSERT_GE(fd, 0, "create_tmp")) {
796e05abc9SAndrii Nakryiko 		err = fd;
806e05abc9SAndrii Nakryiko 		goto done;
816e05abc9SAndrii Nakryiko 	}
826e05abc9SAndrii Nakryiko 	f = fdopen(fd, "w");
836e05abc9SAndrii Nakryiko 	if (CHECK(f == NULL, "open_tmp",  "failed to open file: %s(%d)\n",
846e05abc9SAndrii Nakryiko 		  strerror(errno), errno)) {
856e05abc9SAndrii Nakryiko 		close(fd);
866e05abc9SAndrii Nakryiko 		goto done;
876e05abc9SAndrii Nakryiko 	}
886e05abc9SAndrii Nakryiko 
8960ba87bbSAndrii Nakryiko 	err = btf_dump_all_types(btf, f);
906e05abc9SAndrii Nakryiko 	fclose(f);
916e05abc9SAndrii Nakryiko 	close(fd);
926e05abc9SAndrii Nakryiko 	if (CHECK(err, "btf_dump", "failure during C dumping: %d\n", err)) {
936e05abc9SAndrii Nakryiko 		goto done;
946e05abc9SAndrii Nakryiko 	}
956e05abc9SAndrii Nakryiko 
966e05abc9SAndrii Nakryiko 	snprintf(test_file, sizeof(test_file), "progs/%s.c", t->file);
976e05abc9SAndrii Nakryiko 	if (access(test_file, R_OK) == -1)
986e05abc9SAndrii Nakryiko 		/*
996e05abc9SAndrii Nakryiko 		 * When the test is run with O=, kselftest copies TEST_FILES
1006e05abc9SAndrii Nakryiko 		 * without preserving the directory structure.
1016e05abc9SAndrii Nakryiko 		 */
1026e05abc9SAndrii Nakryiko 		snprintf(test_file, sizeof(test_file), "%s.c", t->file);
1036e05abc9SAndrii Nakryiko 	/*
1046e05abc9SAndrii Nakryiko 	 * Diff test output and expected test output, contained between
1056e05abc9SAndrii Nakryiko 	 * START-EXPECTED-OUTPUT and END-EXPECTED-OUTPUT lines in test case.
1066e05abc9SAndrii Nakryiko 	 * For expected output lines, everything before '*' is stripped out.
1076e05abc9SAndrii Nakryiko 	 * Also lines containing comment start and comment end markers are
1086e05abc9SAndrii Nakryiko 	 * ignored.
1096e05abc9SAndrii Nakryiko 	 */
1106e05abc9SAndrii Nakryiko 	snprintf(diff_cmd, sizeof(diff_cmd),
1116e05abc9SAndrii Nakryiko 		 "awk '/START-EXPECTED-OUTPUT/{out=1;next} "
1126e05abc9SAndrii Nakryiko 		 "/END-EXPECTED-OUTPUT/{out=0} "
1136e05abc9SAndrii Nakryiko 		 "/\\/\\*|\\*\\//{next} " /* ignore comment start/end lines */
1146e05abc9SAndrii Nakryiko 		 "out {sub(/^[ \\t]*\\*/, \"\"); print}' '%s' | diff -u - '%s'",
1156e05abc9SAndrii Nakryiko 		 test_file, out_file);
1166e05abc9SAndrii Nakryiko 	err = system(diff_cmd);
1176e05abc9SAndrii Nakryiko 	if (CHECK(err, "diff",
1186e05abc9SAndrii Nakryiko 		  "differing test output, output=%s, err=%d, diff cmd:\n%s\n",
1196e05abc9SAndrii Nakryiko 		  out_file, err, diff_cmd))
1206e05abc9SAndrii Nakryiko 		goto done;
1216e05abc9SAndrii Nakryiko 
1226e05abc9SAndrii Nakryiko 	remove(out_file);
1236e05abc9SAndrii Nakryiko 
1246e05abc9SAndrii Nakryiko done:
1256e05abc9SAndrii Nakryiko 	btf__free(btf);
1266e05abc9SAndrii Nakryiko 	return err;
1276e05abc9SAndrii Nakryiko }
1286e05abc9SAndrii Nakryiko 
129f4d385e4SAndrii Nakryiko static char *dump_buf;
130f4d385e4SAndrii Nakryiko static size_t dump_buf_sz;
131f4d385e4SAndrii Nakryiko static FILE *dump_buf_file;
132f4d385e4SAndrii Nakryiko 
test_btf_dump_incremental(void)1336972dc3bSAndrii Nakryiko static void test_btf_dump_incremental(void)
134f4d385e4SAndrii Nakryiko {
135f4d385e4SAndrii Nakryiko 	struct btf *btf = NULL;
136f4d385e4SAndrii Nakryiko 	struct btf_dump *d = NULL;
137f4d385e4SAndrii Nakryiko 	int id, err, i;
138f4d385e4SAndrii Nakryiko 
139f4d385e4SAndrii Nakryiko 	dump_buf_file = open_memstream(&dump_buf, &dump_buf_sz);
140f4d385e4SAndrii Nakryiko 	if (!ASSERT_OK_PTR(dump_buf_file, "dump_memstream"))
141f4d385e4SAndrii Nakryiko 		return;
142f4d385e4SAndrii Nakryiko 	btf = btf__new_empty();
143f4d385e4SAndrii Nakryiko 	if (!ASSERT_OK_PTR(btf, "new_empty"))
144f4d385e4SAndrii Nakryiko 		goto err_out;
14560ba87bbSAndrii Nakryiko 	d = btf_dump__new(btf, btf_dump_printf, dump_buf_file, NULL);
146f4d385e4SAndrii Nakryiko 	if (!ASSERT_OK(libbpf_get_error(d), "btf_dump__new"))
147f4d385e4SAndrii Nakryiko 		goto err_out;
148f4d385e4SAndrii Nakryiko 
149f4d385e4SAndrii Nakryiko 	/* First, generate BTF corresponding to the following C code:
150f4d385e4SAndrii Nakryiko 	 *
151bd004cadSXu Kuohai 	 * enum x;
152bd004cadSXu Kuohai 	 *
153bd004cadSXu Kuohai 	 * enum x { X = 1 };
154bd004cadSXu Kuohai 	 *
155bd004cadSXu Kuohai 	 * enum { Y = 1 };
156bd004cadSXu Kuohai 	 *
157bd004cadSXu Kuohai 	 * struct s;
158f4d385e4SAndrii Nakryiko 	 *
159f4d385e4SAndrii Nakryiko 	 * struct s { int x; };
160f4d385e4SAndrii Nakryiko 	 *
161f4d385e4SAndrii Nakryiko 	 */
162bd004cadSXu Kuohai 	id = btf__add_enum(btf, "x", 4);
163bd004cadSXu Kuohai 	ASSERT_EQ(id, 1, "enum_declaration_id");
164bd004cadSXu Kuohai 	id = btf__add_enum(btf, "x", 4);
165bd004cadSXu Kuohai 	ASSERT_EQ(id, 2, "named_enum_id");
166bd004cadSXu Kuohai 	err = btf__add_enum_value(btf, "X", 1);
167bd004cadSXu Kuohai 	ASSERT_OK(err, "named_enum_val_ok");
168bd004cadSXu Kuohai 
169f4d385e4SAndrii Nakryiko 	id = btf__add_enum(btf, NULL, 4);
170bd004cadSXu Kuohai 	ASSERT_EQ(id, 3, "anon_enum_id");
171bd004cadSXu Kuohai 	err = btf__add_enum_value(btf, "Y", 1);
172bd004cadSXu Kuohai 	ASSERT_OK(err, "anon_enum_val_ok");
173f4d385e4SAndrii Nakryiko 
174f4d385e4SAndrii Nakryiko 	id = btf__add_int(btf, "int", 4, BTF_INT_SIGNED);
175bd004cadSXu Kuohai 	ASSERT_EQ(id, 4, "int_id");
176bd004cadSXu Kuohai 
177bd004cadSXu Kuohai 	id = btf__add_fwd(btf, "s", BTF_FWD_STRUCT);
178bd004cadSXu Kuohai 	ASSERT_EQ(id, 5, "fwd_id");
179f4d385e4SAndrii Nakryiko 
180f4d385e4SAndrii Nakryiko 	id = btf__add_struct(btf, "s", 4);
181bd004cadSXu Kuohai 	ASSERT_EQ(id, 6, "struct_id");
182bd004cadSXu Kuohai 	err = btf__add_field(btf, "x", 4, 0, 0);
183f4d385e4SAndrii Nakryiko 	ASSERT_OK(err, "field_ok");
184f4d385e4SAndrii Nakryiko 
185487ef148SHengqi Chen 	for (i = 1; i < btf__type_cnt(btf); i++) {
186f4d385e4SAndrii Nakryiko 		err = btf_dump__dump_type(d, i);
187f4d385e4SAndrii Nakryiko 		ASSERT_OK(err, "dump_type_ok");
188f4d385e4SAndrii Nakryiko 	}
189f4d385e4SAndrii Nakryiko 
190f4d385e4SAndrii Nakryiko 	fflush(dump_buf_file);
191f4d385e4SAndrii Nakryiko 	dump_buf[dump_buf_sz] = 0; /* some libc implementations don't do this */
192bd004cadSXu Kuohai 
193f4d385e4SAndrii Nakryiko 	ASSERT_STREQ(dump_buf,
194bd004cadSXu Kuohai "enum x;\n"
195bd004cadSXu Kuohai "\n"
196bd004cadSXu Kuohai "enum x {\n"
197bd004cadSXu Kuohai "	X = 1,\n"
198f4d385e4SAndrii Nakryiko "};\n"
199f4d385e4SAndrii Nakryiko "\n"
200bd004cadSXu Kuohai "enum {\n"
201bd004cadSXu Kuohai "	Y = 1,\n"
202bd004cadSXu Kuohai "};\n"
203bd004cadSXu Kuohai "\n"
204bd004cadSXu Kuohai "struct s;\n"
205bd004cadSXu Kuohai "\n"
206f4d385e4SAndrii Nakryiko "struct s {\n"
207f4d385e4SAndrii Nakryiko "	int x;\n"
208f4d385e4SAndrii Nakryiko "};\n\n", "c_dump1");
209f4d385e4SAndrii Nakryiko 
210f4d385e4SAndrii Nakryiko 	/* Now, after dumping original BTF, append another struct that embeds
211f4d385e4SAndrii Nakryiko 	 * anonymous enum. It also has a name conflict with the first struct:
212f4d385e4SAndrii Nakryiko 	 *
213f4d385e4SAndrii Nakryiko 	 * struct s___2 {
214f4d385e4SAndrii Nakryiko 	 *     enum { VAL___2 = 1 } x;
215f4d385e4SAndrii Nakryiko 	 *     struct s s;
216f4d385e4SAndrii Nakryiko 	 * };
217f4d385e4SAndrii Nakryiko 	 *
218f4d385e4SAndrii Nakryiko 	 * This will test that btf_dump'er maintains internal state properly.
219f4d385e4SAndrii Nakryiko 	 * Note that VAL___2 enum value. It's because we've already emitted
220f4d385e4SAndrii Nakryiko 	 * that enum as a global anonymous enum, so btf_dump will ensure that
221f4d385e4SAndrii Nakryiko 	 * enum values don't conflict;
222f4d385e4SAndrii Nakryiko 	 *
223f4d385e4SAndrii Nakryiko 	 */
224f4d385e4SAndrii Nakryiko 	fseek(dump_buf_file, 0, SEEK_SET);
225f4d385e4SAndrii Nakryiko 
226f4d385e4SAndrii Nakryiko 	id = btf__add_struct(btf, "s", 4);
227bd004cadSXu Kuohai 	ASSERT_EQ(id, 7, "struct_id");
228bd004cadSXu Kuohai 	err = btf__add_field(btf, "x", 2, 0, 0);
229f4d385e4SAndrii Nakryiko 	ASSERT_OK(err, "field_ok");
230bd004cadSXu Kuohai 	err = btf__add_field(btf, "y", 3, 32, 0);
231bd004cadSXu Kuohai 	ASSERT_OK(err, "field_ok");
232bd004cadSXu Kuohai 	err = btf__add_field(btf, "s", 6, 64, 0);
233f4d385e4SAndrii Nakryiko 	ASSERT_OK(err, "field_ok");
234f4d385e4SAndrii Nakryiko 
235487ef148SHengqi Chen 	for (i = 1; i < btf__type_cnt(btf); i++) {
236f4d385e4SAndrii Nakryiko 		err = btf_dump__dump_type(d, i);
237f4d385e4SAndrii Nakryiko 		ASSERT_OK(err, "dump_type_ok");
238f4d385e4SAndrii Nakryiko 	}
239f4d385e4SAndrii Nakryiko 
240f4d385e4SAndrii Nakryiko 	fflush(dump_buf_file);
241f4d385e4SAndrii Nakryiko 	dump_buf[dump_buf_sz] = 0; /* some libc implementations don't do this */
242f4d385e4SAndrii Nakryiko 	ASSERT_STREQ(dump_buf,
243f4d385e4SAndrii Nakryiko "struct s___2 {\n"
244bd004cadSXu Kuohai "	enum x x;\n"
245f4d385e4SAndrii Nakryiko "	enum {\n"
246bd004cadSXu Kuohai "		Y___2 = 1,\n"
247bd004cadSXu Kuohai "	} y;\n"
248f4d385e4SAndrii Nakryiko "	struct s s;\n"
249f4d385e4SAndrii Nakryiko "};\n\n" , "c_dump1");
250f4d385e4SAndrii Nakryiko 
251f4d385e4SAndrii Nakryiko err_out:
252f4d385e4SAndrii Nakryiko 	fclose(dump_buf_file);
253f4d385e4SAndrii Nakryiko 	free(dump_buf);
254f4d385e4SAndrii Nakryiko 	btf_dump__free(d);
255f4d385e4SAndrii Nakryiko 	btf__free(btf);
256f4d385e4SAndrii Nakryiko }
257f4d385e4SAndrii Nakryiko 
25870a9241fSAlan Maguire #define STRSIZE				4096
25970a9241fSAlan Maguire 
btf_dump_snprintf(void * ctx,const char * fmt,va_list args)26070a9241fSAlan Maguire static void btf_dump_snprintf(void *ctx, const char *fmt, va_list args)
26170a9241fSAlan Maguire {
26270a9241fSAlan Maguire 	char *s = ctx, new[STRSIZE];
26370a9241fSAlan Maguire 
26470a9241fSAlan Maguire 	vsnprintf(new, STRSIZE, fmt, args);
26570a9241fSAlan Maguire 	if (strlen(s) < STRSIZE)
26670a9241fSAlan Maguire 		strncat(s, new, STRSIZE - strlen(s) - 1);
26770a9241fSAlan Maguire }
26870a9241fSAlan Maguire 
btf_dump_data(struct btf * btf,struct btf_dump * d,char * name,char * prefix,__u64 flags,void * ptr,size_t ptr_sz,char * str,const char * expected_val)26970a9241fSAlan Maguire static int btf_dump_data(struct btf *btf, struct btf_dump *d,
27070a9241fSAlan Maguire 			 char *name, char *prefix, __u64 flags, void *ptr,
27170a9241fSAlan Maguire 			 size_t ptr_sz, char *str, const char *expected_val)
27270a9241fSAlan Maguire {
27370a9241fSAlan Maguire 	DECLARE_LIBBPF_OPTS(btf_dump_type_data_opts, opts);
27470a9241fSAlan Maguire 	size_t type_sz;
27570a9241fSAlan Maguire 	__s32 type_id;
27670a9241fSAlan Maguire 	int ret = 0;
27770a9241fSAlan Maguire 
27870a9241fSAlan Maguire 	if (flags & BTF_F_COMPACT)
27970a9241fSAlan Maguire 		opts.compact = true;
28070a9241fSAlan Maguire 	if (flags & BTF_F_NONAME)
28170a9241fSAlan Maguire 		opts.skip_names = true;
28270a9241fSAlan Maguire 	if (flags & BTF_F_ZERO)
28370a9241fSAlan Maguire 		opts.emit_zeroes = true;
28470a9241fSAlan Maguire 	if (prefix) {
28570a9241fSAlan Maguire 		ASSERT_STRNEQ(name, prefix, strlen(prefix),
28670a9241fSAlan Maguire 			      "verify prefix match");
28770a9241fSAlan Maguire 		name += strlen(prefix) + 1;
28870a9241fSAlan Maguire 	}
28970a9241fSAlan Maguire 	type_id = btf__find_by_name(btf, name);
29070a9241fSAlan Maguire 	if (!ASSERT_GE(type_id, 0, "find type id"))
29170a9241fSAlan Maguire 		return -ENOENT;
29270a9241fSAlan Maguire 	type_sz = btf__resolve_size(btf, type_id);
29370a9241fSAlan Maguire 	str[0] = '\0';
29470a9241fSAlan Maguire 	ret = btf_dump__dump_type_data(d, type_id, ptr, ptr_sz, &opts);
29570a9241fSAlan Maguire 	if (type_sz <= ptr_sz) {
29670a9241fSAlan Maguire 		if (!ASSERT_EQ(ret, type_sz, "failed/unexpected type_sz"))
29770a9241fSAlan Maguire 			return -EINVAL;
29870a9241fSAlan Maguire 	} else {
29970a9241fSAlan Maguire 		if (!ASSERT_EQ(ret, -E2BIG, "failed to return -E2BIG"))
30070a9241fSAlan Maguire 			return -EINVAL;
30170a9241fSAlan Maguire 	}
30270a9241fSAlan Maguire 	if (!ASSERT_STREQ(str, expected_val, "ensure expected/actual match"))
30370a9241fSAlan Maguire 		return -EFAULT;
30470a9241fSAlan Maguire 	return 0;
30570a9241fSAlan Maguire }
30670a9241fSAlan Maguire 
30770a9241fSAlan Maguire #define TEST_BTF_DUMP_DATA(_b, _d, _prefix, _str, _type, _flags,	\
30870a9241fSAlan Maguire 			   _expected, ...)				\
30970a9241fSAlan Maguire 	do {								\
31070a9241fSAlan Maguire 		char __ptrtype[64] = #_type;				\
31170a9241fSAlan Maguire 		char *_ptrtype = (char *)__ptrtype;			\
31270a9241fSAlan Maguire 		_type _ptrdata = __VA_ARGS__;				\
31370a9241fSAlan Maguire 		void *_ptr = &_ptrdata;					\
31470a9241fSAlan Maguire 									\
31570a9241fSAlan Maguire 		(void) btf_dump_data(_b, _d, _ptrtype, _prefix, _flags,	\
31670a9241fSAlan Maguire 				     _ptr, sizeof(_type), _str,		\
31770a9241fSAlan Maguire 				     _expected);			\
31870a9241fSAlan Maguire 	} while (0)
31970a9241fSAlan Maguire 
32070a9241fSAlan Maguire /* Use where expected data string matches its stringified declaration */
32170a9241fSAlan Maguire #define TEST_BTF_DUMP_DATA_C(_b, _d, _prefix,  _str, _type, _flags,	\
32270a9241fSAlan Maguire 			     ...)					\
32370a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(_b, _d, _prefix, _str, _type, _flags,	\
32470a9241fSAlan Maguire 			   "(" #_type ")" #__VA_ARGS__,	__VA_ARGS__)
32570a9241fSAlan Maguire 
32670a9241fSAlan Maguire /* overflow test; pass typesize < expected type size, ensure E2BIG returned */
32770a9241fSAlan Maguire #define TEST_BTF_DUMP_DATA_OVER(_b, _d, _prefix, _str, _type, _type_sz,	\
32870a9241fSAlan Maguire 				_expected, ...)				\
32970a9241fSAlan Maguire 	do {								\
33070a9241fSAlan Maguire 		char __ptrtype[64] = #_type;				\
33170a9241fSAlan Maguire 		char *_ptrtype = (char *)__ptrtype;			\
33270a9241fSAlan Maguire 		_type _ptrdata = __VA_ARGS__;				\
33370a9241fSAlan Maguire 		void *_ptr = &_ptrdata;					\
33470a9241fSAlan Maguire 									\
33570a9241fSAlan Maguire 		(void) btf_dump_data(_b, _d, _ptrtype, _prefix, 0,	\
33670a9241fSAlan Maguire 				     _ptr, _type_sz, _str, _expected);	\
33770a9241fSAlan Maguire 	} while (0)
33870a9241fSAlan Maguire 
33970a9241fSAlan Maguire #define TEST_BTF_DUMP_VAR(_b, _d, _prefix, _str, _var, _type, _flags,	\
34070a9241fSAlan Maguire 			  _expected, ...)				\
34170a9241fSAlan Maguire 	do {								\
34270a9241fSAlan Maguire 		_type _ptrdata = __VA_ARGS__;				\
34370a9241fSAlan Maguire 		void *_ptr = &_ptrdata;					\
34470a9241fSAlan Maguire 									\
34570a9241fSAlan Maguire 		(void) btf_dump_data(_b, _d, _var, _prefix, _flags,	\
34670a9241fSAlan Maguire 				     _ptr, sizeof(_type), _str,		\
34770a9241fSAlan Maguire 				     _expected);			\
34870a9241fSAlan Maguire 	} while (0)
34970a9241fSAlan Maguire 
test_btf_dump_int_data(struct btf * btf,struct btf_dump * d,char * str)35070a9241fSAlan Maguire static void test_btf_dump_int_data(struct btf *btf, struct btf_dump *d,
35170a9241fSAlan Maguire 				   char *str)
35270a9241fSAlan Maguire {
353a17553ddSAlan Maguire #ifdef __SIZEOF_INT128__
354486e648cSAndrii Nakryiko 	unsigned __int128 i = 0xffffffffffffffff;
355a17553ddSAlan Maguire 
356a17553ddSAlan Maguire 	/* this dance is required because we cannot directly initialize
357a17553ddSAlan Maguire 	 * a 128-bit value to anything larger than a 64-bit value.
358a17553ddSAlan Maguire 	 */
359a17553ddSAlan Maguire 	i = (i << 64) | (i - 1);
360a17553ddSAlan Maguire #endif
36170a9241fSAlan Maguire 	/* simple int */
36270a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_C(btf, d, NULL, str, int, BTF_F_COMPACT, 1234);
36370a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, int, BTF_F_COMPACT | BTF_F_NONAME,
36470a9241fSAlan Maguire 			   "1234", 1234);
36570a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, int, 0, "(int)1234", 1234);
36670a9241fSAlan Maguire 
36770a9241fSAlan Maguire 	/* zero value should be printed at toplevel */
36870a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, int, BTF_F_COMPACT, "(int)0", 0);
36970a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, int, BTF_F_COMPACT | BTF_F_NONAME,
37070a9241fSAlan Maguire 			   "0", 0);
37170a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, int, BTF_F_COMPACT | BTF_F_ZERO,
37270a9241fSAlan Maguire 			   "(int)0", 0);
37370a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, int,
37470a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_NONAME | BTF_F_ZERO,
37570a9241fSAlan Maguire 			   "0", 0);
37670a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_C(btf, d, NULL, str, int, BTF_F_COMPACT, -4567);
37770a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, int, BTF_F_COMPACT | BTF_F_NONAME,
37870a9241fSAlan Maguire 			   "-4567", -4567);
37970a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, int, 0, "(int)-4567", -4567);
38070a9241fSAlan Maguire 
38170a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_OVER(btf, d, NULL, str, int, sizeof(int)-1, "", 1);
382a17553ddSAlan Maguire 
383a17553ddSAlan Maguire #ifdef __SIZEOF_INT128__
384091037fbSYonghong Song 	/* gcc encode unsigned __int128 type with name "__int128 unsigned" in dwarf,
385091037fbSYonghong Song 	 * and clang encode it with name "unsigned __int128" in dwarf.
386091037fbSYonghong Song 	 * Do an availability test for either variant before doing actual test.
387091037fbSYonghong Song 	 */
388091037fbSYonghong Song 	if (btf__find_by_name(btf, "unsigned __int128") > 0) {
389091037fbSYonghong Song 		TEST_BTF_DUMP_DATA(btf, d, NULL, str, unsigned __int128, BTF_F_COMPACT,
390091037fbSYonghong Song 				   "(unsigned __int128)0xffffffffffffffff",
391a17553ddSAlan Maguire 				   0xffffffffffffffff);
392091037fbSYonghong Song 		ASSERT_OK(btf_dump_data(btf, d, "unsigned __int128", NULL, 0, &i, 16, str,
393091037fbSYonghong Song 					"(unsigned __int128)0xfffffffffffffffffffffffffffffffe"),
394091037fbSYonghong Song 			  "dump unsigned __int128");
395091037fbSYonghong Song 	} else if (btf__find_by_name(btf, "__int128 unsigned") > 0) {
396091037fbSYonghong Song 		TEST_BTF_DUMP_DATA(btf, d, NULL, str, __int128 unsigned, BTF_F_COMPACT,
397091037fbSYonghong Song 				   "(__int128 unsigned)0xffffffffffffffff",
398091037fbSYonghong Song 				   0xffffffffffffffff);
399091037fbSYonghong Song 		ASSERT_OK(btf_dump_data(btf, d, "__int128 unsigned", NULL, 0, &i, 16, str,
400091037fbSYonghong Song 					"(__int128 unsigned)0xfffffffffffffffffffffffffffffffe"),
401091037fbSYonghong Song 			  "dump unsigned __int128");
402091037fbSYonghong Song 	} else {
403091037fbSYonghong Song 		ASSERT_TRUE(false, "unsigned_int128_not_found");
404091037fbSYonghong Song 	}
405a17553ddSAlan Maguire #endif
40670a9241fSAlan Maguire }
40770a9241fSAlan Maguire 
test_btf_dump_float_data(struct btf * btf,struct btf_dump * d,char * str)40870a9241fSAlan Maguire static void test_btf_dump_float_data(struct btf *btf, struct btf_dump *d,
40970a9241fSAlan Maguire 				     char *str)
41070a9241fSAlan Maguire {
41170a9241fSAlan Maguire 	float t1 = 1.234567;
41270a9241fSAlan Maguire 	float t2 = -1.234567;
41370a9241fSAlan Maguire 	float t3 = 0.0;
41470a9241fSAlan Maguire 	double t4 = 5.678912;
41570a9241fSAlan Maguire 	double t5 = -5.678912;
41670a9241fSAlan Maguire 	double t6 = 0.0;
41770a9241fSAlan Maguire 	long double t7 = 9.876543;
41870a9241fSAlan Maguire 	long double t8 = -9.876543;
41970a9241fSAlan Maguire 	long double t9 = 0.0;
42070a9241fSAlan Maguire 
42170a9241fSAlan Maguire 	/* since the kernel does not likely have any float types in its BTF, we
42270a9241fSAlan Maguire 	 * will need to add some of various sizes.
42370a9241fSAlan Maguire 	 */
42470a9241fSAlan Maguire 
42570a9241fSAlan Maguire 	ASSERT_GT(btf__add_float(btf, "test_float", 4), 0, "add float");
42670a9241fSAlan Maguire 	ASSERT_OK(btf_dump_data(btf, d, "test_float", NULL, 0, &t1, 4, str,
42770a9241fSAlan Maguire 				"(test_float)1.234567"), "dump float");
42870a9241fSAlan Maguire 	ASSERT_OK(btf_dump_data(btf, d, "test_float", NULL, 0, &t2, 4, str,
42970a9241fSAlan Maguire 				"(test_float)-1.234567"), "dump float");
43070a9241fSAlan Maguire 	ASSERT_OK(btf_dump_data(btf, d, "test_float", NULL, 0, &t3, 4, str,
43170a9241fSAlan Maguire 				"(test_float)0.000000"), "dump float");
43270a9241fSAlan Maguire 
43370a9241fSAlan Maguire 	ASSERT_GT(btf__add_float(btf, "test_double", 8), 0, "add_double");
43470a9241fSAlan Maguire 	ASSERT_OK(btf_dump_data(btf, d, "test_double", NULL, 0, &t4, 8, str,
43570a9241fSAlan Maguire 		  "(test_double)5.678912"), "dump double");
43670a9241fSAlan Maguire 	ASSERT_OK(btf_dump_data(btf, d, "test_double", NULL, 0, &t5, 8, str,
43770a9241fSAlan Maguire 		  "(test_double)-5.678912"), "dump double");
43870a9241fSAlan Maguire 	ASSERT_OK(btf_dump_data(btf, d, "test_double", NULL, 0, &t6, 8, str,
43970a9241fSAlan Maguire 				"(test_double)0.000000"), "dump double");
44070a9241fSAlan Maguire 
44170a9241fSAlan Maguire 	ASSERT_GT(btf__add_float(btf, "test_long_double", 16), 0, "add long double");
44270a9241fSAlan Maguire 	ASSERT_OK(btf_dump_data(btf, d, "test_long_double", NULL, 0, &t7, 16,
44370a9241fSAlan Maguire 				str, "(test_long_double)9.876543"),
44470a9241fSAlan Maguire 				"dump long_double");
44570a9241fSAlan Maguire 	ASSERT_OK(btf_dump_data(btf, d, "test_long_double", NULL, 0, &t8, 16,
44670a9241fSAlan Maguire 				str, "(test_long_double)-9.876543"),
44770a9241fSAlan Maguire 				"dump long_double");
44870a9241fSAlan Maguire 	ASSERT_OK(btf_dump_data(btf, d, "test_long_double", NULL, 0, &t9, 16,
44970a9241fSAlan Maguire 				str, "(test_long_double)0.000000"),
45070a9241fSAlan Maguire 				"dump long_double");
45170a9241fSAlan Maguire }
45270a9241fSAlan Maguire 
test_btf_dump_char_data(struct btf * btf,struct btf_dump * d,char * str)45370a9241fSAlan Maguire static void test_btf_dump_char_data(struct btf *btf, struct btf_dump *d,
45470a9241fSAlan Maguire 				    char *str)
45570a9241fSAlan Maguire {
45670a9241fSAlan Maguire 	/* simple char */
45770a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_C(btf, d, NULL, str, char, BTF_F_COMPACT, 100);
45870a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, char, BTF_F_COMPACT | BTF_F_NONAME,
45970a9241fSAlan Maguire 			   "100", 100);
46070a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, char, 0, "(char)100", 100);
46170a9241fSAlan Maguire 	/* zero value should be printed at toplevel */
46270a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, char, BTF_F_COMPACT,
46370a9241fSAlan Maguire 			   "(char)0", 0);
46470a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, char, BTF_F_COMPACT | BTF_F_NONAME,
46570a9241fSAlan Maguire 			   "0", 0);
46670a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, char, BTF_F_COMPACT | BTF_F_ZERO,
46770a9241fSAlan Maguire 			   "(char)0", 0);
46870a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, char, BTF_F_COMPACT | BTF_F_NONAME | BTF_F_ZERO,
46970a9241fSAlan Maguire 			   "0", 0);
47070a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, char, 0, "(char)0", 0);
47170a9241fSAlan Maguire 
47270a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_OVER(btf, d, NULL, str, char, sizeof(char)-1, "", 100);
47370a9241fSAlan Maguire }
47470a9241fSAlan Maguire 
test_btf_dump_typedef_data(struct btf * btf,struct btf_dump * d,char * str)47570a9241fSAlan Maguire static void test_btf_dump_typedef_data(struct btf *btf, struct btf_dump *d,
47670a9241fSAlan Maguire 				       char *str)
47770a9241fSAlan Maguire {
47870a9241fSAlan Maguire 	/* simple typedef */
47970a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_C(btf, d, NULL, str, uint64_t, BTF_F_COMPACT, 100);
48070a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, u64, BTF_F_COMPACT | BTF_F_NONAME,
48170a9241fSAlan Maguire 			   "1", 1);
48270a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, u64, 0, "(u64)1", 1);
48370a9241fSAlan Maguire 	/* zero value should be printed at toplevel */
48470a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, u64, BTF_F_COMPACT, "(u64)0", 0);
48570a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, u64, BTF_F_COMPACT | BTF_F_NONAME,
48670a9241fSAlan Maguire 			   "0", 0);
48770a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, u64, BTF_F_COMPACT | BTF_F_ZERO,
48870a9241fSAlan Maguire 			   "(u64)0", 0);
48970a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, u64,
49070a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_NONAME | BTF_F_ZERO,
49170a9241fSAlan Maguire 			   "0", 0);
49270a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, u64, 0, "(u64)0", 0);
49370a9241fSAlan Maguire 
49470a9241fSAlan Maguire 	/* typedef struct */
49570a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_C(btf, d, NULL, str, atomic_t, BTF_F_COMPACT,
49670a9241fSAlan Maguire 			     {.counter = (int)1,});
49770a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, atomic_t, BTF_F_COMPACT | BTF_F_NONAME,
49870a9241fSAlan Maguire 			   "{1,}", { .counter = 1 });
49970a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, atomic_t, 0,
50070a9241fSAlan Maguire "(atomic_t){\n"
50170a9241fSAlan Maguire "	.counter = (int)1,\n"
50270a9241fSAlan Maguire "}",
50370a9241fSAlan Maguire 			   {.counter = 1,});
50470a9241fSAlan Maguire 	/* typedef with 0 value should be printed at toplevel */
50570a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, atomic_t, BTF_F_COMPACT, "(atomic_t){}",
50670a9241fSAlan Maguire 			   {.counter = 0,});
50770a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, atomic_t, BTF_F_COMPACT | BTF_F_NONAME,
50870a9241fSAlan Maguire 			   "{}", {.counter = 0,});
50970a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, atomic_t, 0,
51070a9241fSAlan Maguire "(atomic_t){\n"
51170a9241fSAlan Maguire "}",
51270a9241fSAlan Maguire 			   {.counter = 0,});
51370a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, atomic_t, BTF_F_COMPACT | BTF_F_ZERO,
51470a9241fSAlan Maguire 			   "(atomic_t){.counter = (int)0,}",
51570a9241fSAlan Maguire 			   {.counter = 0,});
51670a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, atomic_t,
51770a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_NONAME | BTF_F_ZERO,
51870a9241fSAlan Maguire 			   "{0,}", {.counter = 0,});
51970a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, NULL, str, atomic_t, BTF_F_ZERO,
52070a9241fSAlan Maguire "(atomic_t){\n"
52170a9241fSAlan Maguire "	.counter = (int)0,\n"
52270a9241fSAlan Maguire "}",
52370a9241fSAlan Maguire 			   { .counter = 0,});
52470a9241fSAlan Maguire 
52570a9241fSAlan Maguire 	/* overflow should show type but not value since it overflows */
52670a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_OVER(btf, d, NULL, str, atomic_t, sizeof(atomic_t)-1,
52770a9241fSAlan Maguire 				"(atomic_t){\n", { .counter = 1});
52870a9241fSAlan Maguire }
52970a9241fSAlan Maguire 
test_btf_dump_enum_data(struct btf * btf,struct btf_dump * d,char * str)53070a9241fSAlan Maguire static void test_btf_dump_enum_data(struct btf *btf, struct btf_dump *d,
53170a9241fSAlan Maguire 				    char *str)
53270a9241fSAlan Maguire {
53370a9241fSAlan Maguire 	/* enum where enum value does (and does not) exist */
53470a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_C(btf, d, "enum", str, enum bpf_cmd, BTF_F_COMPACT,
53570a9241fSAlan Maguire 			     BPF_MAP_CREATE);
53670a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "enum", str, enum bpf_cmd, BTF_F_COMPACT,
53770a9241fSAlan Maguire 			   "(enum bpf_cmd)BPF_MAP_CREATE", 0);
53870a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "enum", str, enum bpf_cmd,
53970a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_NONAME,
54070a9241fSAlan Maguire 			   "BPF_MAP_CREATE",
54170a9241fSAlan Maguire 			   BPF_MAP_CREATE);
54270a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "enum", str, enum bpf_cmd, 0,
54370a9241fSAlan Maguire 			   "(enum bpf_cmd)BPF_MAP_CREATE",
54470a9241fSAlan Maguire 			   BPF_MAP_CREATE);
54570a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "enum", str, enum bpf_cmd,
54670a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_NONAME | BTF_F_ZERO,
54770a9241fSAlan Maguire 			   "BPF_MAP_CREATE", 0);
54870a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "enum", str, enum bpf_cmd,
54970a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_ZERO,
55070a9241fSAlan Maguire 			   "(enum bpf_cmd)BPF_MAP_CREATE",
55170a9241fSAlan Maguire 			   BPF_MAP_CREATE);
55270a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "enum", str, enum bpf_cmd,
55370a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_NONAME | BTF_F_ZERO,
55470a9241fSAlan Maguire 			   "BPF_MAP_CREATE", BPF_MAP_CREATE);
55570a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_C(btf, d, "enum", str, enum bpf_cmd, BTF_F_COMPACT, 2000);
55670a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "enum", str, enum bpf_cmd,
55770a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_NONAME,
55870a9241fSAlan Maguire 			   "2000", 2000);
55970a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "enum", str, enum bpf_cmd, 0,
56070a9241fSAlan Maguire 			   "(enum bpf_cmd)2000", 2000);
56170a9241fSAlan Maguire 
56270a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_OVER(btf, d, "enum", str, enum bpf_cmd,
56370a9241fSAlan Maguire 				sizeof(enum bpf_cmd) - 1, "", BPF_MAP_CREATE);
56470a9241fSAlan Maguire }
56570a9241fSAlan Maguire 
test_btf_dump_struct_data(struct btf * btf,struct btf_dump * d,char * str)56670a9241fSAlan Maguire static void test_btf_dump_struct_data(struct btf *btf, struct btf_dump *d,
56770a9241fSAlan Maguire 				      char *str)
56870a9241fSAlan Maguire {
56970a9241fSAlan Maguire 	DECLARE_LIBBPF_OPTS(btf_dump_type_data_opts, opts);
57070a9241fSAlan Maguire 	char zero_data[512] = { };
57170a9241fSAlan Maguire 	char type_data[512];
57270a9241fSAlan Maguire 	void *fops = type_data;
57370a9241fSAlan Maguire 	void *skb = type_data;
57470a9241fSAlan Maguire 	size_t type_sz;
57570a9241fSAlan Maguire 	__s32 type_id;
57670a9241fSAlan Maguire 	char *cmpstr;
57770a9241fSAlan Maguire 	int ret;
57870a9241fSAlan Maguire 
57970a9241fSAlan Maguire 	memset(type_data, 255, sizeof(type_data));
58070a9241fSAlan Maguire 
58170a9241fSAlan Maguire 	/* simple struct */
58270a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_C(btf, d, "struct", str, struct btf_enum, BTF_F_COMPACT,
58370a9241fSAlan Maguire 			     {.name_off = (__u32)3,.val = (__s32)-1,});
58470a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct btf_enum,
58570a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_NONAME,
58670a9241fSAlan Maguire 			   "{3,-1,}",
58770a9241fSAlan Maguire 			   { .name_off = 3, .val = -1,});
58870a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct btf_enum, 0,
58970a9241fSAlan Maguire "(struct btf_enum){\n"
59070a9241fSAlan Maguire "	.name_off = (__u32)3,\n"
59170a9241fSAlan Maguire "	.val = (__s32)-1,\n"
59270a9241fSAlan Maguire "}",
59370a9241fSAlan Maguire 			   { .name_off = 3, .val = -1,});
59470a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct btf_enum,
59570a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_NONAME,
59670a9241fSAlan Maguire 			   "{-1,}",
59770a9241fSAlan Maguire 			   { .name_off = 0, .val = -1,});
59870a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct btf_enum,
59970a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_NONAME | BTF_F_ZERO,
60070a9241fSAlan Maguire 			   "{0,-1,}",
60170a9241fSAlan Maguire 			   { .name_off = 0, .val = -1,});
60270a9241fSAlan Maguire 	/* empty struct should be printed */
60370a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct btf_enum, BTF_F_COMPACT,
60470a9241fSAlan Maguire 			   "(struct btf_enum){}",
60570a9241fSAlan Maguire 			   { .name_off = 0, .val = 0,});
60670a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct btf_enum,
60770a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_NONAME,
60870a9241fSAlan Maguire 			   "{}",
60970a9241fSAlan Maguire 			   { .name_off = 0, .val = 0,});
61070a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct btf_enum, 0,
61170a9241fSAlan Maguire "(struct btf_enum){\n"
61270a9241fSAlan Maguire "}",
61370a9241fSAlan Maguire 			   { .name_off = 0, .val = 0,});
61470a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct btf_enum,
61570a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_ZERO,
61670a9241fSAlan Maguire 			   "(struct btf_enum){.name_off = (__u32)0,.val = (__s32)0,}",
61770a9241fSAlan Maguire 			   { .name_off = 0, .val = 0,});
61870a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct btf_enum,
61970a9241fSAlan Maguire 			   BTF_F_ZERO,
62070a9241fSAlan Maguire "(struct btf_enum){\n"
62170a9241fSAlan Maguire "	.name_off = (__u32)0,\n"
62270a9241fSAlan Maguire "	.val = (__s32)0,\n"
62370a9241fSAlan Maguire "}",
62470a9241fSAlan Maguire 			   { .name_off = 0, .val = 0,});
62570a9241fSAlan Maguire 
62670a9241fSAlan Maguire 	/* struct with pointers */
62770a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct list_head, BTF_F_COMPACT,
62870a9241fSAlan Maguire 			   "(struct list_head){.next = (struct list_head *)0x1,}",
62970a9241fSAlan Maguire 			   { .next = (struct list_head *)1 });
63070a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct list_head, 0,
63170a9241fSAlan Maguire "(struct list_head){\n"
63270a9241fSAlan Maguire "	.next = (struct list_head *)0x1,\n"
63370a9241fSAlan Maguire "}",
63470a9241fSAlan Maguire 			   { .next = (struct list_head *)1 });
63570a9241fSAlan Maguire 	/* NULL pointer should not be displayed */
63670a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct list_head, BTF_F_COMPACT,
63770a9241fSAlan Maguire 			   "(struct list_head){}",
63870a9241fSAlan Maguire 			   { .next = (struct list_head *)0 });
63970a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct list_head, 0,
64070a9241fSAlan Maguire "(struct list_head){\n"
64170a9241fSAlan Maguire "}",
64270a9241fSAlan Maguire 			   { .next = (struct list_head *)0 });
64370a9241fSAlan Maguire 
64470a9241fSAlan Maguire 	/* struct with function pointers */
64570a9241fSAlan Maguire 	type_id = btf__find_by_name(btf, "file_operations");
64670a9241fSAlan Maguire 	if (ASSERT_GT(type_id, 0, "find type id")) {
64770a9241fSAlan Maguire 		type_sz = btf__resolve_size(btf, type_id);
64870a9241fSAlan Maguire 		str[0] = '\0';
64970a9241fSAlan Maguire 
65070a9241fSAlan Maguire 		ret = btf_dump__dump_type_data(d, type_id, fops, type_sz, &opts);
65170a9241fSAlan Maguire 		ASSERT_EQ(ret, type_sz,
65270a9241fSAlan Maguire 			  "unexpected return value dumping file_operations");
65370a9241fSAlan Maguire 		cmpstr =
65470a9241fSAlan Maguire "(struct file_operations){\n"
65570a9241fSAlan Maguire "	.owner = (struct module *)0xffffffffffffffff,\n"
65670a9241fSAlan Maguire "	.llseek = (loff_t (*)(struct file *, loff_t, int))0xffffffffffffffff,";
65770a9241fSAlan Maguire 
65870a9241fSAlan Maguire 		ASSERT_STRNEQ(str, cmpstr, strlen(cmpstr), "file_operations");
65970a9241fSAlan Maguire 	}
66070a9241fSAlan Maguire 
66170a9241fSAlan Maguire 	/* struct with char array */
66270a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct bpf_prog_info, BTF_F_COMPACT,
66370a9241fSAlan Maguire 			   "(struct bpf_prog_info){.name = (char[16])['f','o','o',],}",
66470a9241fSAlan Maguire 			   { .name = "foo",});
66570a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct bpf_prog_info,
66670a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_NONAME,
66770a9241fSAlan Maguire 			   "{['f','o','o',],}",
66870a9241fSAlan Maguire 			   {.name = "foo",});
66970a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct bpf_prog_info, 0,
67070a9241fSAlan Maguire "(struct bpf_prog_info){\n"
67170a9241fSAlan Maguire "	.name = (char[16])[\n"
67270a9241fSAlan Maguire "		'f',\n"
67370a9241fSAlan Maguire "		'o',\n"
67470a9241fSAlan Maguire "		'o',\n"
67570a9241fSAlan Maguire "	],\n"
67670a9241fSAlan Maguire "}",
67770a9241fSAlan Maguire 			   {.name = "foo",});
67870a9241fSAlan Maguire 	/* leading null char means do not display string */
67970a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct bpf_prog_info, BTF_F_COMPACT,
68070a9241fSAlan Maguire 			   "(struct bpf_prog_info){}",
68170a9241fSAlan Maguire 			   {.name = {'\0', 'f', 'o', 'o'}});
68270a9241fSAlan Maguire 	/* handle non-printable characters */
68370a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct bpf_prog_info, BTF_F_COMPACT,
68470a9241fSAlan Maguire 			   "(struct bpf_prog_info){.name = (char[16])[1,2,3,],}",
68570a9241fSAlan Maguire 			   { .name = {1, 2, 3, 0}});
68670a9241fSAlan Maguire 
68770a9241fSAlan Maguire 	/* struct with non-char array */
68870a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct __sk_buff, BTF_F_COMPACT,
68970a9241fSAlan Maguire 			   "(struct __sk_buff){.cb = (__u32[5])[1,2,3,4,5,],}",
69070a9241fSAlan Maguire 			   { .cb = {1, 2, 3, 4, 5,},});
69170a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct __sk_buff,
69270a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_NONAME,
69370a9241fSAlan Maguire 			   "{[1,2,3,4,5,],}",
69470a9241fSAlan Maguire 			   { .cb = { 1, 2, 3, 4, 5},});
69570a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct __sk_buff, 0,
69670a9241fSAlan Maguire "(struct __sk_buff){\n"
69770a9241fSAlan Maguire "	.cb = (__u32[5])[\n"
69870a9241fSAlan Maguire "		1,\n"
69970a9241fSAlan Maguire "		2,\n"
70070a9241fSAlan Maguire "		3,\n"
70170a9241fSAlan Maguire "		4,\n"
70270a9241fSAlan Maguire "		5,\n"
70370a9241fSAlan Maguire "	],\n"
70470a9241fSAlan Maguire "}",
70570a9241fSAlan Maguire 			   { .cb = { 1, 2, 3, 4, 5},});
70670a9241fSAlan Maguire 	/* For non-char, arrays, show non-zero values only */
70770a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct __sk_buff, BTF_F_COMPACT,
70870a9241fSAlan Maguire 			   "(struct __sk_buff){.cb = (__u32[5])[0,0,1,0,0,],}",
70970a9241fSAlan Maguire 			   { .cb = { 0, 0, 1, 0, 0},});
71070a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct __sk_buff, 0,
71170a9241fSAlan Maguire "(struct __sk_buff){\n"
71270a9241fSAlan Maguire "	.cb = (__u32[5])[\n"
71370a9241fSAlan Maguire "		0,\n"
71470a9241fSAlan Maguire "		0,\n"
71570a9241fSAlan Maguire "		1,\n"
71670a9241fSAlan Maguire "		0,\n"
71770a9241fSAlan Maguire "		0,\n"
71870a9241fSAlan Maguire "	],\n"
71970a9241fSAlan Maguire "}",
72070a9241fSAlan Maguire 			   { .cb = { 0, 0, 1, 0, 0},});
72170a9241fSAlan Maguire 
72270a9241fSAlan Maguire 	/* struct with bitfields */
72370a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_C(btf, d, "struct", str, struct bpf_insn, BTF_F_COMPACT,
72470a9241fSAlan Maguire 		{.code = (__u8)1,.dst_reg = (__u8)0x2,.src_reg = (__u8)0x3,.off = (__s16)4,.imm = (__s32)5,});
72570a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct bpf_insn,
72670a9241fSAlan Maguire 			   BTF_F_COMPACT | BTF_F_NONAME,
72770a9241fSAlan Maguire 			   "{1,0x2,0x3,4,5,}",
72870a9241fSAlan Maguire 			   { .code = 1, .dst_reg = 0x2, .src_reg = 0x3, .off = 4,
72970a9241fSAlan Maguire 			     .imm = 5,});
73070a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct bpf_insn, 0,
73170a9241fSAlan Maguire "(struct bpf_insn){\n"
73270a9241fSAlan Maguire "	.code = (__u8)1,\n"
73370a9241fSAlan Maguire "	.dst_reg = (__u8)0x2,\n"
73470a9241fSAlan Maguire "	.src_reg = (__u8)0x3,\n"
73570a9241fSAlan Maguire "	.off = (__s16)4,\n"
73670a9241fSAlan Maguire "	.imm = (__s32)5,\n"
73770a9241fSAlan Maguire "}",
73870a9241fSAlan Maguire 			   {.code = 1, .dst_reg = 2, .src_reg = 3, .off = 4, .imm = 5});
73970a9241fSAlan Maguire 
74070a9241fSAlan Maguire 	/* zeroed bitfields should not be displayed */
74170a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct bpf_insn, BTF_F_COMPACT,
74270a9241fSAlan Maguire 			   "(struct bpf_insn){.dst_reg = (__u8)0x1,}",
74370a9241fSAlan Maguire 			   { .code = 0, .dst_reg = 1});
74470a9241fSAlan Maguire 
74570a9241fSAlan Maguire 	/* struct with enum bitfield */
74670a9241fSAlan Maguire 	type_id = btf__find_by_name(btf, "fs_context");
74770a9241fSAlan Maguire 	if (ASSERT_GT(type_id,  0, "find fs_context")) {
74870a9241fSAlan Maguire 		type_sz = btf__resolve_size(btf, type_id);
74970a9241fSAlan Maguire 		str[0] = '\0';
75070a9241fSAlan Maguire 
75170a9241fSAlan Maguire 		opts.emit_zeroes = true;
75270a9241fSAlan Maguire 		ret = btf_dump__dump_type_data(d, type_id, zero_data, type_sz, &opts);
75370a9241fSAlan Maguire 		ASSERT_EQ(ret, type_sz,
75470a9241fSAlan Maguire 			  "unexpected return value dumping fs_context");
75570a9241fSAlan Maguire 
75670a9241fSAlan Maguire 		ASSERT_NEQ(strstr(str, "FS_CONTEXT_FOR_MOUNT"), NULL,
75770a9241fSAlan Maguire 				  "bitfield value not present");
75870a9241fSAlan Maguire 	}
75970a9241fSAlan Maguire 
76070a9241fSAlan Maguire 	/* struct with nested anon union */
76170a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "struct", str, struct bpf_sock_ops, BTF_F_COMPACT,
76270a9241fSAlan Maguire 			   "(struct bpf_sock_ops){.op = (__u32)1,(union){.args = (__u32[4])[1,2,3,4,],.reply = (__u32)1,.replylong = (__u32[4])[1,2,3,4,],},}",
76370a9241fSAlan Maguire 			   { .op = 1, .args = { 1, 2, 3, 4}});
76470a9241fSAlan Maguire 
76570a9241fSAlan Maguire 	/* union with nested struct */
76670a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA(btf, d, "union", str, union bpf_iter_link_info, BTF_F_COMPACT,
767b3e1331eSKui-Feng Lee 			   "(union bpf_iter_link_info){.map = (struct){.map_fd = (__u32)1,},.cgroup = (struct){.order = (enum bpf_cgroup_iter_order)BPF_CGROUP_ITER_SELF_ONLY,.cgroup_fd = (__u32)1,},.task = (struct){.tid = (__u32)1,.pid = (__u32)1,},}",
768d4ccaf58SHao Luo 			   { .cgroup = { .order = 1, .cgroup_fd = 1, }});
76970a9241fSAlan Maguire 
77070a9241fSAlan Maguire 	/* struct skb with nested structs/unions; because type output is so
77170a9241fSAlan Maguire 	 * complex, we don't do a string comparison, just verify we return
77270a9241fSAlan Maguire 	 * the type size as the amount of data displayed.
77370a9241fSAlan Maguire 	 */
77470a9241fSAlan Maguire 	type_id = btf__find_by_name(btf, "sk_buff");
77570a9241fSAlan Maguire 	if (ASSERT_GT(type_id, 0, "find struct sk_buff")) {
77670a9241fSAlan Maguire 		type_sz = btf__resolve_size(btf, type_id);
77770a9241fSAlan Maguire 		str[0] = '\0';
77870a9241fSAlan Maguire 
77970a9241fSAlan Maguire 		ret = btf_dump__dump_type_data(d, type_id, skb, type_sz, &opts);
78070a9241fSAlan Maguire 		ASSERT_EQ(ret, type_sz,
78170a9241fSAlan Maguire 			  "unexpected return value dumping sk_buff");
78270a9241fSAlan Maguire 	}
78370a9241fSAlan Maguire 
78470a9241fSAlan Maguire 	/* overflow bpf_sock_ops struct with final element nonzero/zero.
78570a9241fSAlan Maguire 	 * Regardless of the value of the final field, we don't have all the
78670a9241fSAlan Maguire 	 * data we need to display it, so we should trigger an overflow.
787fa721d4fSDrew Fustini 	 * In other words overflow checking should trump "is field zero?"
78870a9241fSAlan Maguire 	 * checks because if we've overflowed, it shouldn't matter what the
78970a9241fSAlan Maguire 	 * field is - we can't trust its value so shouldn't display it.
79070a9241fSAlan Maguire 	 */
79170a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_OVER(btf, d, "struct", str, struct bpf_sock_ops,
79270a9241fSAlan Maguire 				sizeof(struct bpf_sock_ops) - 1,
79370a9241fSAlan Maguire 				"(struct bpf_sock_ops){\n\t.op = (__u32)1,\n",
7948cac7a59SMartin KaFai Lau 				{ .op = 1, .skb_hwtstamp = 2});
79570a9241fSAlan Maguire 	TEST_BTF_DUMP_DATA_OVER(btf, d, "struct", str, struct bpf_sock_ops,
79670a9241fSAlan Maguire 				sizeof(struct bpf_sock_ops) - 1,
79770a9241fSAlan Maguire 				"(struct bpf_sock_ops){\n\t.op = (__u32)1,\n",
7988cac7a59SMartin KaFai Lau 				{ .op = 1, .skb_hwtstamp = 0});
79970a9241fSAlan Maguire }
80070a9241fSAlan Maguire 
test_btf_dump_var_data(struct btf * btf,struct btf_dump * d,char * str)80170a9241fSAlan Maguire static void test_btf_dump_var_data(struct btf *btf, struct btf_dump *d,
80270a9241fSAlan Maguire 				   char *str)
80370a9241fSAlan Maguire {
804*8f161ca1SAlexei Starovoitov #if 0
80570a9241fSAlan Maguire 	TEST_BTF_DUMP_VAR(btf, d, NULL, str, "cpu_number", int, BTF_F_COMPACT,
80670a9241fSAlan Maguire 			  "int cpu_number = (int)100", 100);
807b16d12f3SIlya Leoshkevich #endif
80870a9241fSAlan Maguire 	TEST_BTF_DUMP_VAR(btf, d, NULL, str, "cpu_profile_flip", int, BTF_F_COMPACT,
80970a9241fSAlan Maguire 			  "static int cpu_profile_flip = (int)2", 2);
81070a9241fSAlan Maguire }
81170a9241fSAlan Maguire 
test_btf_datasec(struct btf * btf,struct btf_dump * d,char * str,const char * name,const char * expected_val,void * data,size_t data_sz)81270a9241fSAlan Maguire static void test_btf_datasec(struct btf *btf, struct btf_dump *d, char *str,
81370a9241fSAlan Maguire 			     const char *name, const char *expected_val,
81470a9241fSAlan Maguire 			     void *data, size_t data_sz)
81570a9241fSAlan Maguire {
81670a9241fSAlan Maguire 	DECLARE_LIBBPF_OPTS(btf_dump_type_data_opts, opts);
81770a9241fSAlan Maguire 	int ret = 0, cmp;
81870a9241fSAlan Maguire 	size_t secsize;
81970a9241fSAlan Maguire 	__s32 type_id;
82070a9241fSAlan Maguire 
82170a9241fSAlan Maguire 	opts.compact = true;
82270a9241fSAlan Maguire 
82370a9241fSAlan Maguire 	type_id = btf__find_by_name(btf, name);
82470a9241fSAlan Maguire 	if (!ASSERT_GT(type_id, 0, "find type id"))
82570a9241fSAlan Maguire 		return;
82670a9241fSAlan Maguire 
82770a9241fSAlan Maguire 	secsize = btf__resolve_size(btf, type_id);
82870a9241fSAlan Maguire 	ASSERT_EQ(secsize,  0, "verify section size");
82970a9241fSAlan Maguire 
83070a9241fSAlan Maguire 	str[0] = '\0';
83170a9241fSAlan Maguire 	ret = btf_dump__dump_type_data(d, type_id, data, data_sz, &opts);
83270a9241fSAlan Maguire 	ASSERT_EQ(ret, 0, "unexpected return value");
83370a9241fSAlan Maguire 
83470a9241fSAlan Maguire 	cmp = strcmp(str, expected_val);
83570a9241fSAlan Maguire 	ASSERT_EQ(cmp, 0, "ensure expected/actual match");
83670a9241fSAlan Maguire }
83770a9241fSAlan Maguire 
test_btf_dump_datasec_data(char * str)83870a9241fSAlan Maguire static void test_btf_dump_datasec_data(char *str)
83970a9241fSAlan Maguire {
840f7958752SAndrii Nakryiko 	struct btf *btf;
84170a9241fSAlan Maguire 	char license[4] = "GPL";
84270a9241fSAlan Maguire 	struct btf_dump *d;
84370a9241fSAlan Maguire 
844afef88e6SDaniel Müller 	btf = btf__parse("xdping_kern.bpf.o", NULL);
845afef88e6SDaniel Müller 	if (!ASSERT_OK_PTR(btf, "xdping_kern.bpf.o BTF not found"))
84670a9241fSAlan Maguire 		return;
84770a9241fSAlan Maguire 
84860ba87bbSAndrii Nakryiko 	d = btf_dump__new(btf, btf_dump_snprintf, str, NULL);
84970a9241fSAlan Maguire 	if (!ASSERT_OK_PTR(d, "could not create BTF dump"))
850f7958752SAndrii Nakryiko 		goto out;
85170a9241fSAlan Maguire 
85270a9241fSAlan Maguire 	test_btf_datasec(btf, d, str, "license",
85370a9241fSAlan Maguire 			 "SEC(\"license\") char[4] _license = (char[4])['G','P','L',];",
85470a9241fSAlan Maguire 			 license, sizeof(license));
855f7958752SAndrii Nakryiko out:
856f7958752SAndrii Nakryiko 	btf_dump__free(d);
857f7958752SAndrii Nakryiko 	btf__free(btf);
85870a9241fSAlan Maguire }
85970a9241fSAlan Maguire 
test_btf_dump()8606e05abc9SAndrii Nakryiko void test_btf_dump() {
86170a9241fSAlan Maguire 	char str[STRSIZE];
86270a9241fSAlan Maguire 	struct btf_dump *d;
86370a9241fSAlan Maguire 	struct btf *btf;
8646e05abc9SAndrii Nakryiko 	int i;
8656e05abc9SAndrii Nakryiko 
8666e05abc9SAndrii Nakryiko 	for (i = 0; i < ARRAY_SIZE(btf_dump_test_cases); i++) {
8676e05abc9SAndrii Nakryiko 		struct btf_dump_test_case *t = &btf_dump_test_cases[i];
8686e05abc9SAndrii Nakryiko 
8696e05abc9SAndrii Nakryiko 		if (!test__start_subtest(t->name))
8706e05abc9SAndrii Nakryiko 			continue;
8716e05abc9SAndrii Nakryiko 
8726e05abc9SAndrii Nakryiko 		test_btf_dump_case(i, &btf_dump_test_cases[i]);
8736e05abc9SAndrii Nakryiko 	}
874f4d385e4SAndrii Nakryiko 	if (test__start_subtest("btf_dump: incremental"))
875f4d385e4SAndrii Nakryiko 		test_btf_dump_incremental();
87670a9241fSAlan Maguire 
87770a9241fSAlan Maguire 	btf = libbpf_find_kernel_btf();
87870a9241fSAlan Maguire 	if (!ASSERT_OK_PTR(btf, "no kernel BTF found"))
87970a9241fSAlan Maguire 		return;
88070a9241fSAlan Maguire 
88160ba87bbSAndrii Nakryiko 	d = btf_dump__new(btf, btf_dump_snprintf, str, NULL);
88270a9241fSAlan Maguire 	if (!ASSERT_OK_PTR(d, "could not create BTF dump"))
88370a9241fSAlan Maguire 		return;
88470a9241fSAlan Maguire 
88570a9241fSAlan Maguire 	/* Verify type display for various types. */
88670a9241fSAlan Maguire 	if (test__start_subtest("btf_dump: int_data"))
88770a9241fSAlan Maguire 		test_btf_dump_int_data(btf, d, str);
88870a9241fSAlan Maguire 	if (test__start_subtest("btf_dump: float_data"))
88970a9241fSAlan Maguire 		test_btf_dump_float_data(btf, d, str);
89070a9241fSAlan Maguire 	if (test__start_subtest("btf_dump: char_data"))
89170a9241fSAlan Maguire 		test_btf_dump_char_data(btf, d, str);
89270a9241fSAlan Maguire 	if (test__start_subtest("btf_dump: typedef_data"))
89370a9241fSAlan Maguire 		test_btf_dump_typedef_data(btf, d, str);
89470a9241fSAlan Maguire 	if (test__start_subtest("btf_dump: enum_data"))
89570a9241fSAlan Maguire 		test_btf_dump_enum_data(btf, d, str);
89670a9241fSAlan Maguire 	if (test__start_subtest("btf_dump: struct_data"))
89770a9241fSAlan Maguire 		test_btf_dump_struct_data(btf, d, str);
89870a9241fSAlan Maguire 	if (test__start_subtest("btf_dump: var_data"))
89970a9241fSAlan Maguire 		test_btf_dump_var_data(btf, d, str);
90070a9241fSAlan Maguire 	btf_dump__free(d);
90170a9241fSAlan Maguire 	btf__free(btf);
90270a9241fSAlan Maguire 
90370a9241fSAlan Maguire 	if (test__start_subtest("btf_dump: datasec_data"))
90470a9241fSAlan Maguire 		test_btf_dump_datasec_data(str);
9056e05abc9SAndrii Nakryiko }
906