test_printf.c 9.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390
  1. /*
  2. * Test cases for printf facility.
  3. */
  4. #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  5. #include <linux/init.h>
  6. #include <linux/kernel.h>
  7. #include <linux/module.h>
  8. #include <linux/printk.h>
  9. #include <linux/random.h>
  10. #include <linux/slab.h>
  11. #include <linux/string.h>
  12. #include <linux/socket.h>
  13. #include <linux/in.h>
  14. #define BUF_SIZE 256
  15. #define PAD_SIZE 16
  16. #define FILL_CHAR '$'
  17. #define PTR1 ((void*)0x01234567)
  18. #define PTR2 ((void*)(long)(int)0xfedcba98)
  19. #if BITS_PER_LONG == 64
  20. #define PTR1_ZEROES "000000000"
  21. #define PTR1_SPACES " "
  22. #define PTR1_STR "1234567"
  23. #define PTR2_STR "fffffffffedcba98"
  24. #define PTR_WIDTH 16
  25. #else
  26. #define PTR1_ZEROES "0"
  27. #define PTR1_SPACES " "
  28. #define PTR1_STR "1234567"
  29. #define PTR2_STR "fedcba98"
  30. #define PTR_WIDTH 8
  31. #endif
  32. #define PTR_WIDTH_STR stringify(PTR_WIDTH)
  33. static unsigned total_tests __initdata;
  34. static unsigned failed_tests __initdata;
  35. static char *test_buffer __initdata;
  36. static char *alloced_buffer __initdata;
  37. static int __printf(4, 0) __init
  38. do_test(int bufsize, const char *expect, int elen,
  39. const char *fmt, va_list ap)
  40. {
  41. va_list aq;
  42. int ret, written;
  43. total_tests++;
  44. memset(alloced_buffer, FILL_CHAR, BUF_SIZE + 2*PAD_SIZE);
  45. va_copy(aq, ap);
  46. ret = vsnprintf(test_buffer, bufsize, fmt, aq);
  47. va_end(aq);
  48. if (ret != elen) {
  49. pr_warn("vsnprintf(buf, %d, \"%s\", ...) returned %d, expected %d\n",
  50. bufsize, fmt, ret, elen);
  51. return 1;
  52. }
  53. if (memchr_inv(alloced_buffer, FILL_CHAR, PAD_SIZE)) {
  54. pr_warn("vsnprintf(buf, %d, \"%s\", ...) wrote before buffer\n", bufsize, fmt);
  55. return 1;
  56. }
  57. if (!bufsize) {
  58. if (memchr_inv(test_buffer, FILL_CHAR, BUF_SIZE + PAD_SIZE)) {
  59. pr_warn("vsnprintf(buf, 0, \"%s\", ...) wrote to buffer\n",
  60. fmt);
  61. return 1;
  62. }
  63. return 0;
  64. }
  65. written = min(bufsize-1, elen);
  66. if (test_buffer[written]) {
  67. pr_warn("vsnprintf(buf, %d, \"%s\", ...) did not nul-terminate buffer\n",
  68. bufsize, fmt);
  69. return 1;
  70. }
  71. if (memchr_inv(test_buffer + written + 1, FILL_CHAR, BUF_SIZE + PAD_SIZE - (written + 1))) {
  72. pr_warn("vsnprintf(buf, %d, \"%s\", ...) wrote beyond the nul-terminator\n",
  73. bufsize, fmt);
  74. return 1;
  75. }
  76. if (memcmp(test_buffer, expect, written)) {
  77. pr_warn("vsnprintf(buf, %d, \"%s\", ...) wrote '%s', expected '%.*s'\n",
  78. bufsize, fmt, test_buffer, written, expect);
  79. return 1;
  80. }
  81. return 0;
  82. }
  83. static void __printf(3, 4) __init
  84. __test(const char *expect, int elen, const char *fmt, ...)
  85. {
  86. va_list ap;
  87. int rand;
  88. char *p;
  89. if (elen >= BUF_SIZE) {
  90. pr_err("error in test suite: expected output length %d too long. Format was '%s'.\n",
  91. elen, fmt);
  92. failed_tests++;
  93. return;
  94. }
  95. va_start(ap, fmt);
  96. /*
  97. * Every fmt+args is subjected to four tests: Three where we
  98. * tell vsnprintf varying buffer sizes (plenty, not quite
  99. * enough and 0), and then we also test that kvasprintf would
  100. * be able to print it as expected.
  101. */
  102. failed_tests += do_test(BUF_SIZE, expect, elen, fmt, ap);
  103. rand = 1 + prandom_u32_max(elen+1);
  104. /* Since elen < BUF_SIZE, we have 1 <= rand <= BUF_SIZE. */
  105. failed_tests += do_test(rand, expect, elen, fmt, ap);
  106. failed_tests += do_test(0, expect, elen, fmt, ap);
  107. p = kvasprintf(GFP_KERNEL, fmt, ap);
  108. if (p) {
  109. if (memcmp(p, expect, elen+1)) {
  110. pr_warn("kvasprintf(..., \"%s\", ...) returned '%s', expected '%s'\n",
  111. fmt, p, expect);
  112. failed_tests++;
  113. }
  114. kfree(p);
  115. }
  116. va_end(ap);
  117. }
  118. #define test(expect, fmt, ...) \
  119. __test(expect, strlen(expect), fmt, ##__VA_ARGS__)
  120. static void __init
  121. test_basic(void)
  122. {
  123. /* Work around annoying "warning: zero-length gnu_printf format string". */
  124. char nul = '\0';
  125. test("", &nul);
  126. test("100%", "100%%");
  127. test("xxx%yyy", "xxx%cyyy", '%');
  128. __test("xxx\0yyy", 7, "xxx%cyyy", '\0');
  129. }
  130. static void __init
  131. test_number(void)
  132. {
  133. test("0x1234abcd ", "%#-12x", 0x1234abcd);
  134. test(" 0x1234abcd", "%#12x", 0x1234abcd);
  135. test("0|001| 12|+123| 1234|-123|-1234", "%d|%03d|%3d|%+d|% d|%+d|% d", 0, 1, 12, 123, 1234, -123, -1234);
  136. }
  137. static void __init
  138. test_string(void)
  139. {
  140. test("", "%s%.0s", "", "123");
  141. test("ABCD|abc|123", "%s|%.3s|%.*s", "ABCD", "abcdef", 3, "123456");
  142. test("1 | 2|3 | 4|5 ", "%-3s|%3s|%-*s|%*s|%*s", "1", "2", 3, "3", 3, "4", -3, "5");
  143. test("1234 ", "%-10.4s", "123456");
  144. test(" 1234", "%10.4s", "123456");
  145. /*
  146. * POSIX and C99 say that a negative precision (which is only
  147. * possible to pass via a * argument) should be treated as if
  148. * the precision wasn't present, and that if the precision is
  149. * omitted (as in %.s), the precision should be taken to be
  150. * 0. However, the kernel's printf behave exactly opposite,
  151. * treating a negative precision as 0 and treating an omitted
  152. * precision specifier as if no precision was given.
  153. *
  154. * These test cases document the current behaviour; should
  155. * anyone ever feel the need to follow the standards more
  156. * closely, this can be revisited.
  157. */
  158. test(" ", "%4.*s", -5, "123456");
  159. test("123456", "%.s", "123456");
  160. test("a||", "%.s|%.0s|%.*s", "a", "b", 0, "c");
  161. test("a | | ", "%-3.s|%-3.0s|%-3.*s", "a", "b", 0, "c");
  162. }
  163. static void __init
  164. plain(void)
  165. {
  166. test(PTR1_ZEROES PTR1_STR " " PTR2_STR, "%p %p", PTR1, PTR2);
  167. /*
  168. * The field width is overloaded for some %p extensions to
  169. * pass another piece of information. For plain pointers, the
  170. * behaviour is slightly odd: One cannot pass either the 0
  171. * flag nor a precision to %p without gcc complaining, and if
  172. * one explicitly gives a field width, the number is no longer
  173. * zero-padded.
  174. */
  175. test("|" PTR1_STR PTR1_SPACES " | " PTR1_SPACES PTR1_STR "|",
  176. "|%-*p|%*p|", PTR_WIDTH+2, PTR1, PTR_WIDTH+2, PTR1);
  177. test("|" PTR2_STR " | " PTR2_STR "|",
  178. "|%-*p|%*p|", PTR_WIDTH+2, PTR2, PTR_WIDTH+2, PTR2);
  179. /*
  180. * Unrecognized %p extensions are treated as plain %p, but the
  181. * alphanumeric suffix is ignored (that is, does not occur in
  182. * the output.)
  183. */
  184. test("|"PTR1_ZEROES PTR1_STR"|", "|%p0y|", PTR1);
  185. test("|"PTR2_STR"|", "|%p0y|", PTR2);
  186. }
  187. static void __init
  188. symbol_ptr(void)
  189. {
  190. }
  191. static void __init
  192. kernel_ptr(void)
  193. {
  194. }
  195. static void __init
  196. struct_resource(void)
  197. {
  198. }
  199. static void __init
  200. addr(void)
  201. {
  202. }
  203. static void __init
  204. escaped_str(void)
  205. {
  206. }
  207. static void __init
  208. hex_string(void)
  209. {
  210. const char buf[3] = {0xc0, 0xff, 0xee};
  211. test("c0 ff ee|c0:ff:ee|c0-ff-ee|c0ffee",
  212. "%3ph|%3phC|%3phD|%3phN", buf, buf, buf, buf);
  213. test("c0 ff ee|c0:ff:ee|c0-ff-ee|c0ffee",
  214. "%*ph|%*phC|%*phD|%*phN", 3, buf, 3, buf, 3, buf, 3, buf);
  215. }
  216. static void __init
  217. mac(void)
  218. {
  219. const u8 addr[6] = {0x2d, 0x48, 0xd6, 0xfc, 0x7a, 0x05};
  220. test("2d:48:d6:fc:7a:05", "%pM", addr);
  221. test("05:7a:fc:d6:48:2d", "%pMR", addr);
  222. test("2d-48-d6-fc-7a-05", "%pMF", addr);
  223. test("2d48d6fc7a05", "%pm", addr);
  224. test("057afcd6482d", "%pmR", addr);
  225. }
  226. static void __init
  227. ip4(void)
  228. {
  229. struct sockaddr_in sa;
  230. sa.sin_family = AF_INET;
  231. sa.sin_port = cpu_to_be16(12345);
  232. sa.sin_addr.s_addr = cpu_to_be32(0x7f000001);
  233. test("127.000.000.001|127.0.0.1", "%pi4|%pI4", &sa.sin_addr, &sa.sin_addr);
  234. test("127.000.000.001|127.0.0.1", "%piS|%pIS", &sa, &sa);
  235. sa.sin_addr.s_addr = cpu_to_be32(0x01020304);
  236. test("001.002.003.004:12345|1.2.3.4:12345", "%piSp|%pISp", &sa, &sa);
  237. }
  238. static void __init
  239. ip6(void)
  240. {
  241. }
  242. static void __init
  243. ip(void)
  244. {
  245. ip4();
  246. ip6();
  247. }
  248. static void __init
  249. uuid(void)
  250. {
  251. const char uuid[16] = {0x0, 0x1, 0x2, 0x3, 0x4, 0x5, 0x6, 0x7,
  252. 0x8, 0x9, 0xa, 0xb, 0xc, 0xd, 0xe, 0xf};
  253. test("00010203-0405-0607-0809-0a0b0c0d0e0f", "%pUb", uuid);
  254. test("00010203-0405-0607-0809-0A0B0C0D0E0F", "%pUB", uuid);
  255. test("03020100-0504-0706-0809-0a0b0c0d0e0f", "%pUl", uuid);
  256. test("03020100-0504-0706-0809-0A0B0C0D0E0F", "%pUL", uuid);
  257. }
  258. static void __init
  259. dentry(void)
  260. {
  261. }
  262. static void __init
  263. struct_va_format(void)
  264. {
  265. }
  266. static void __init
  267. struct_clk(void)
  268. {
  269. }
  270. static void __init
  271. bitmap(void)
  272. {
  273. DECLARE_BITMAP(bits, 20);
  274. const int primes[] = {2,3,5,7,11,13,17,19};
  275. int i;
  276. bitmap_zero(bits, 20);
  277. test("00000|00000", "%20pb|%*pb", bits, 20, bits);
  278. test("|", "%20pbl|%*pbl", bits, 20, bits);
  279. for (i = 0; i < ARRAY_SIZE(primes); ++i)
  280. set_bit(primes[i], bits);
  281. test("a28ac|a28ac", "%20pb|%*pb", bits, 20, bits);
  282. test("2-3,5,7,11,13,17,19|2-3,5,7,11,13,17,19", "%20pbl|%*pbl", bits, 20, bits);
  283. bitmap_fill(bits, 20);
  284. test("fffff|fffff", "%20pb|%*pb", bits, 20, bits);
  285. test("0-19|0-19", "%20pbl|%*pbl", bits, 20, bits);
  286. }
  287. static void __init
  288. netdev_features(void)
  289. {
  290. }
  291. static void __init
  292. test_pointer(void)
  293. {
  294. plain();
  295. symbol_ptr();
  296. kernel_ptr();
  297. struct_resource();
  298. addr();
  299. escaped_str();
  300. hex_string();
  301. mac();
  302. ip();
  303. uuid();
  304. dentry();
  305. struct_va_format();
  306. struct_clk();
  307. bitmap();
  308. netdev_features();
  309. }
  310. static int __init
  311. test_printf_init(void)
  312. {
  313. alloced_buffer = kmalloc(BUF_SIZE + 2*PAD_SIZE, GFP_KERNEL);
  314. if (!alloced_buffer)
  315. return -ENOMEM;
  316. test_buffer = alloced_buffer + PAD_SIZE;
  317. test_basic();
  318. test_number();
  319. test_string();
  320. test_pointer();
  321. kfree(alloced_buffer);
  322. if (failed_tests == 0)
  323. pr_info("all %u tests passed\n", total_tests);
  324. else
  325. pr_warn("failed %u out of %u tests\n", failed_tests, total_tests);
  326. return failed_tests ? -EINVAL : 0;
  327. }
  328. module_init(test_printf_init);
  329. MODULE_AUTHOR("Rasmus Villemoes <linux@rasmusvillemoes.dk>");
  330. MODULE_LICENSE("GPL");