On Wed, Sep 23, 2020 at 06:46:26PM +0100, Alan Maguire wrote:
+static int __strncmp(const void *m1, const void *m2, size_t len) +{
- const unsigned char *s1 = m1;
- const unsigned char *s2 = m2;
- int i, delta = 0;
+#pragma clang loop unroll(full)
Shouldn't be needed? The verifier supports bounded loops.
- for (i = 0; i < len; i++) {
delta = s1[i] - s2[i];
if (delta || s1[i] == 0 || s2[i] == 0)
break;
- }
- return delta;
+}
+/* Use __builtin_btf_type_id to test snprintf_btf by type id instead of name */ +#if __has_builtin(__builtin_btf_type_id) +#define TEST_BTF_BY_ID(_str, _typestr, _ptr, _hflags) \
- do { \
int _expected_ret = ret; \
_ptr.type = 0; \
_ptr.type_id = __builtin_btf_type_id(_typestr, 0); \
The test is passing for me, but I don't understand why :) __builtin_btf_type_id(, 0); means btf_id of the bpf program. While bpf_snprintf_btf() is treating it as btf_id of vmlinux_btf. So it really should have been __builtin_btf_type_id(,1);
The following diff works: diff --git a/tools/testing/selftests/bpf/progs/netif_receive_skb.c b/tools/testing/selftests/bpf/progs/netif_receive_skb.c index b4f96f1f6830..bffa786e3b03 100644 --- a/tools/testing/selftests/bpf/progs/netif_receive_skb.c +++ b/tools/testing/selftests/bpf/progs/netif_receive_skb.c @@ -45,7 +45,7 @@ static int __strncmp(const void *m1, const void *m2, size_t len) do { \ int _expected_ret = ret; \ _ptr.type = 0; \ - _ptr.type_id = __builtin_btf_type_id(_typestr, 0); \ + _ptr.type_id = __builtin_btf_type_id(_typestr, 1); \ ret = bpf_snprintf_btf(_str, STRSIZE, &_ptr, \ sizeof(_ptr), _hflags); \ if (ret != _expected_ret) { \ @@ -88,7 +88,7 @@ static int __strncmp(const void *m1, const void *m2, size_t len) ret = -EBADMSG; \ break; \ } \ - TEST_BTF_BY_ID(_str, #_type, _ptr, _hflags); \ + TEST_BTF_BY_ID(_str, _ptr, _ptr, _hflags); \
But still makes me suspicious of the test. I haven't debugged further.