test_printf.c 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381
  1. /*
  2. * Test cases for printf facility.
  3. */
  4. #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  5. #include <linux/init.h>
  6. #include <linux/kernel.h>
  7. #include <linux/module.h>
  8. #include <linux/printk.h>
  9. #include <linux/random.h>
  10. #include <linux/slab.h>
  11. #include <linux/string.h>
  12. #include <linux/socket.h>
  13. #include <linux/in.h>
  14. #define BUF_SIZE 256
  15. #define PAD_SIZE 16
  16. #define FILL_CHAR '$'
  17. #define PTR1 ((void*)0x01234567)
  18. #define PTR2 ((void*)(long)(int)0xfedcba98)
  19. #if BITS_PER_LONG == 64
  20. #define PTR1_ZEROES "000000000"
  21. #define PTR1_SPACES " "
  22. #define PTR1_STR "1234567"
  23. #define PTR2_STR "fffffffffedcba98"
  24. #define PTR_WIDTH 16
  25. #else
  26. #define PTR1_ZEROES "0"
  27. #define PTR1_SPACES " "
  28. #define PTR1_STR "1234567"
  29. #define PTR2_STR "fedcba98"
  30. #define PTR_WIDTH 8
  31. #endif
  32. #define PTR_WIDTH_STR stringify(PTR_WIDTH)
  33. static unsigned total_tests __initdata;
  34. static unsigned failed_tests __initdata;
  35. static char *test_buffer __initdata;
  36. static char *alloced_buffer __initdata;
  37. static int __printf(4, 0) __init
  38. do_test(int bufsize, const char *expect, int elen,
  39. const char *fmt, va_list ap)
  40. {
  41. va_list aq;
  42. int ret, written;
  43. total_tests++;
  44. memset(alloced_buffer, FILL_CHAR, BUF_SIZE + 2*PAD_SIZE);
  45. va_copy(aq, ap);
  46. ret = vsnprintf(test_buffer, bufsize, fmt, aq);
  47. va_end(aq);
  48. if (ret != elen) {
  49. pr_warn("vsnprintf(buf, %d, \"%s\", ...) returned %d, expected %d\n",
  50. bufsize, fmt, ret, elen);
  51. return 1;
  52. }
  53. if (memchr_inv(alloced_buffer, FILL_CHAR, PAD_SIZE)) {
  54. pr_warn("vsnprintf(buf, %d, \"%s\", ...) wrote before buffer\n", bufsize, fmt);
  55. return 1;
  56. }
  57. if (!bufsize) {
  58. if (memchr_inv(test_buffer, FILL_CHAR, BUF_SIZE + PAD_SIZE)) {
  59. pr_warn("vsnprintf(buf, 0, \"%s\", ...) wrote to buffer\n",
  60. fmt);
  61. return 1;
  62. }
  63. return 0;
  64. }
  65. written = min(bufsize-1, elen);
  66. if (test_buffer[written]) {
  67. pr_warn("vsnprintf(buf, %d, \"%s\", ...) did not nul-terminate buffer\n",
  68. bufsize, fmt);
  69. return 1;
  70. }
  71. if (memchr_inv(test_buffer + written + 1, FILL_CHAR, BUF_SIZE + PAD_SIZE - (written + 1))) {
  72. pr_warn("vsnprintf(buf, %d, \"%s\", ...) wrote beyond the nul-terminator\n",
  73. bufsize, fmt);
  74. return 1;
  75. }
  76. if (memcmp(test_buffer, expect, written)) {
  77. pr_warn("vsnprintf(buf, %d, \"%s\", ...) wrote '%s', expected '%.*s'\n",
  78. bufsize, fmt, test_buffer, written, expect);
  79. return 1;
  80. }
  81. return 0;
  82. }
  83. static void __printf(3, 4) __init
  84. __test(const char *expect, int elen, const char *fmt, ...)
  85. {
  86. va_list ap;
  87. int rand;
  88. char *p;
  89. if (elen >= BUF_SIZE) {
  90. pr_err("error in test suite: expected output length %d too long. Format was '%s'.\n",
  91. elen, fmt);
  92. failed_tests++;
  93. return;
  94. }
  95. va_start(ap, fmt);
  96. /*
  97. * Every fmt+args is subjected to four tests: Three where we
  98. * tell vsnprintf varying buffer sizes (plenty, not quite
  99. * enough and 0), and then we also test that kvasprintf would
  100. * be able to print it as expected.
  101. */
  102. failed_tests += do_test(BUF_SIZE, expect, elen, fmt, ap);
  103. rand = 1 + prandom_u32_max(elen+1);
  104. /* Since elen < BUF_SIZE, we have 1 <= rand <= BUF_SIZE. */
  105. failed_tests += do_test(rand, expect, elen, fmt, ap);
  106. failed_tests += do_test(0, expect, elen, fmt, ap);
  107. p = kvasprintf(GFP_KERNEL, fmt, ap);
  108. if (p) {
  109. if (memcmp(p, expect, elen+1)) {
  110. pr_warn("kvasprintf(..., \"%s\", ...) returned '%s', expected '%s'\n",
  111. fmt, p, expect);
  112. failed_tests++;
  113. }
  114. kfree(p);
  115. }
  116. va_end(ap);
  117. }
  118. #define test(expect, fmt, ...) \
  119. __test(expect, strlen(expect), fmt, ##__VA_ARGS__)
  120. static void __init
  121. test_basic(void)
  122. {
  123. /* Work around annoying "warning: zero-length gnu_printf format string". */
  124. char nul = '\0';
  125. test("", &nul);
  126. test("100%", "100%%");
  127. test("xxx%yyy", "xxx%cyyy", '%');
  128. __test("xxx\0yyy", 7, "xxx%cyyy", '\0');
  129. }
  130. static void __init
  131. test_number(void)
  132. {
  133. test("0x1234abcd ", "%#-12x", 0x1234abcd);
  134. test(" 0x1234abcd", "%#12x", 0x1234abcd);
  135. test("0|001| 12|+123| 1234|-123|-1234", "%d|%03d|%3d|%+d|% d|%+d|% d", 0, 1, 12, 123, 1234, -123, -1234);
  136. }
  137. static void __init
  138. test_string(void)
  139. {
  140. test("", "%s%.0s", "", "123");
  141. test("ABCD|abc|123", "%s|%.3s|%.*s", "ABCD", "abcdef", 3, "123456");
  142. test("1 | 2|3 | 4|5 ", "%-3s|%3s|%-*s|%*s|%*s", "1", "2", 3, "3", 3, "4", -3, "5");
  143. /*
  144. * POSIX and C99 say that a missing precision should be
  145. * treated as a precision of 0. However, the kernel's printf
  146. * implementation treats this case as if the . wasn't
  147. * present. Let's add a test case documenting the current
  148. * behaviour; should anyone ever feel the need to follow the
  149. * standards more closely, this can be revisited.
  150. */
  151. test("a||", "%.s|%.0s|%.*s", "a", "b", 0, "c");
  152. test("a | | ", "%-3.s|%-3.0s|%-3.*s", "a", "b", 0, "c");
  153. }
  154. static void __init
  155. plain(void)
  156. {
  157. test(PTR1_ZEROES PTR1_STR " " PTR2_STR, "%p %p", PTR1, PTR2);
  158. /*
  159. * The field width is overloaded for some %p extensions to
  160. * pass another piece of information. For plain pointers, the
  161. * behaviour is slightly odd: One cannot pass either the 0
  162. * flag nor a precision to %p without gcc complaining, and if
  163. * one explicitly gives a field width, the number is no longer
  164. * zero-padded.
  165. */
  166. test("|" PTR1_STR PTR1_SPACES " | " PTR1_SPACES PTR1_STR "|",
  167. "|%-*p|%*p|", PTR_WIDTH+2, PTR1, PTR_WIDTH+2, PTR1);
  168. test("|" PTR2_STR " | " PTR2_STR "|",
  169. "|%-*p|%*p|", PTR_WIDTH+2, PTR2, PTR_WIDTH+2, PTR2);
  170. /*
  171. * Unrecognized %p extensions are treated as plain %p, but the
  172. * alphanumeric suffix is ignored (that is, does not occur in
  173. * the output.)
  174. */
  175. test("|"PTR1_ZEROES PTR1_STR"|", "|%p0y|", PTR1);
  176. test("|"PTR2_STR"|", "|%p0y|", PTR2);
  177. }
  178. static void __init
  179. symbol_ptr(void)
  180. {
  181. }
  182. static void __init
  183. kernel_ptr(void)
  184. {
  185. }
  186. static void __init
  187. struct_resource(void)
  188. {
  189. }
  190. static void __init
  191. addr(void)
  192. {
  193. }
  194. static void __init
  195. escaped_str(void)
  196. {
  197. }
  198. static void __init
  199. hex_string(void)
  200. {
  201. const char buf[3] = {0xc0, 0xff, 0xee};
  202. test("c0 ff ee|c0:ff:ee|c0-ff-ee|c0ffee",
  203. "%3ph|%3phC|%3phD|%3phN", buf, buf, buf, buf);
  204. test("c0 ff ee|c0:ff:ee|c0-ff-ee|c0ffee",
  205. "%*ph|%*phC|%*phD|%*phN", 3, buf, 3, buf, 3, buf, 3, buf);
  206. }
  207. static void __init
  208. mac(void)
  209. {
  210. const u8 addr[6] = {0x2d, 0x48, 0xd6, 0xfc, 0x7a, 0x05};
  211. test("2d:48:d6:fc:7a:05", "%pM", addr);
  212. test("05:7a:fc:d6:48:2d", "%pMR", addr);
  213. test("2d-48-d6-fc-7a-05", "%pMF", addr);
  214. test("2d48d6fc7a05", "%pm", addr);
  215. test("057afcd6482d", "%pmR", addr);
  216. }
  217. static void __init
  218. ip4(void)
  219. {
  220. struct sockaddr_in sa;
  221. sa.sin_family = AF_INET;
  222. sa.sin_port = cpu_to_be16(12345);
  223. sa.sin_addr.s_addr = cpu_to_be32(0x7f000001);
  224. test("127.000.000.001|127.0.0.1", "%pi4|%pI4", &sa.sin_addr, &sa.sin_addr);
  225. test("127.000.000.001|127.0.0.1", "%piS|%pIS", &sa, &sa);
  226. sa.sin_addr.s_addr = cpu_to_be32(0x01020304);
  227. test("001.002.003.004:12345|1.2.3.4:12345", "%piSp|%pISp", &sa, &sa);
  228. }
  229. static void __init
  230. ip6(void)
  231. {
  232. }
  233. static void __init
  234. ip(void)
  235. {
  236. ip4();
  237. ip6();
  238. }
  239. static void __init
  240. uuid(void)
  241. {
  242. const char uuid[16] = {0x0, 0x1, 0x2, 0x3, 0x4, 0x5, 0x6, 0x7,
  243. 0x8, 0x9, 0xa, 0xb, 0xc, 0xd, 0xe, 0xf};
  244. test("00010203-0405-0607-0809-0a0b0c0d0e0f", "%pUb", uuid);
  245. test("00010203-0405-0607-0809-0A0B0C0D0E0F", "%pUB", uuid);
  246. test("03020100-0504-0706-0809-0a0b0c0d0e0f", "%pUl", uuid);
  247. test("03020100-0504-0706-0809-0A0B0C0D0E0F", "%pUL", uuid);
  248. }
  249. static void __init
  250. dentry(void)
  251. {
  252. }
  253. static void __init
  254. struct_va_format(void)
  255. {
  256. }
  257. static void __init
  258. struct_clk(void)
  259. {
  260. }
  261. static void __init
  262. bitmap(void)
  263. {
  264. DECLARE_BITMAP(bits, 20);
  265. const int primes[] = {2,3,5,7,11,13,17,19};
  266. int i;
  267. bitmap_zero(bits, 20);
  268. test("00000|00000", "%20pb|%*pb", bits, 20, bits);
  269. test("|", "%20pbl|%*pbl", bits, 20, bits);
  270. for (i = 0; i < ARRAY_SIZE(primes); ++i)
  271. set_bit(primes[i], bits);
  272. test("a28ac|a28ac", "%20pb|%*pb", bits, 20, bits);
  273. test("2-3,5,7,11,13,17,19|2-3,5,7,11,13,17,19", "%20pbl|%*pbl", bits, 20, bits);
  274. bitmap_fill(bits, 20);
  275. test("fffff|fffff", "%20pb|%*pb", bits, 20, bits);
  276. test("0-19|0-19", "%20pbl|%*pbl", bits, 20, bits);
  277. }
  278. static void __init
  279. netdev_features(void)
  280. {
  281. }
  282. static void __init
  283. test_pointer(void)
  284. {
  285. plain();
  286. symbol_ptr();
  287. kernel_ptr();
  288. struct_resource();
  289. addr();
  290. escaped_str();
  291. hex_string();
  292. mac();
  293. ip();
  294. uuid();
  295. dentry();
  296. struct_va_format();
  297. struct_clk();
  298. bitmap();
  299. netdev_features();
  300. }
  301. static int __init
  302. test_printf_init(void)
  303. {
  304. alloced_buffer = kmalloc(BUF_SIZE + 2*PAD_SIZE, GFP_KERNEL);
  305. if (!alloced_buffer)
  306. return -ENOMEM;
  307. test_buffer = alloced_buffer + PAD_SIZE;
  308. test_basic();
  309. test_number();
  310. test_string();
  311. test_pointer();
  312. kfree(alloced_buffer);
  313. if (failed_tests == 0)
  314. pr_info("all %u tests passed\n", total_tests);
  315. else
  316. pr_warn("failed %u out of %u tests\n", failed_tests, total_tests);
  317. return failed_tests ? -EINVAL : 0;
  318. }
  319. module_init(test_printf_init);
  320. MODULE_AUTHOR("Rasmus Villemoes <linux@rasmusvillemoes.dk>");
  321. MODULE_LICENSE("GPL");