From: Hengqi Chen <hengqi.chen@gmail.com>
To: bpf@vger.kernel.org
Cc: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org,
yhs@fb.com, john.fastabend@gmail.com, hengqi.chen@gmail.com
Subject: [PATCH bpf-next 2/2] selftests/bpf: Test BPF map creation using BTF-defined key/value
Date: Sun, 5 Sep 2021 18:09:14 +0800 [thread overview]
Message-ID: <20210905100914.33007-2-hengqi.chen@gmail.com> (raw)
In-Reply-To: <20210905100914.33007-1-hengqi.chen@gmail.com>
Test BPF map creation using BTF-defined key/value. The test defines
some specialized maps by specifying BTF types for key/value and
checks those maps are correctly initialized and loaded.
Signed-off-by: Hengqi Chen <hengqi.chen@gmail.com>
---
.../selftests/bpf/prog_tests/map_create.c | 87 ++++++++++++++
.../selftests/bpf/progs/test_map_create.c | 110 ++++++++++++++++++
2 files changed, 197 insertions(+)
create mode 100644 tools/testing/selftests/bpf/prog_tests/map_create.c
create mode 100644 tools/testing/selftests/bpf/progs/test_map_create.c
diff --git a/tools/testing/selftests/bpf/prog_tests/map_create.c b/tools/testing/selftests/bpf/prog_tests/map_create.c
new file mode 100644
index 000000000000..6ca32d0dffd2
--- /dev/null
+++ b/tools/testing/selftests/bpf/prog_tests/map_create.c
@@ -0,0 +1,87 @@
+/* SPDX-License-Identifier: GPL-2.0 */
+/* Copyright (c) 2021 Hengqi Chen */
+
+#include <test_progs.h>
+#include "test_map_create.skel.h"
+
+void test_map_create(void)
+{
+ struct test_map_create *skel;
+ int err, fd;
+
+ skel = test_map_create__open();
+ if (!ASSERT_OK_PTR(skel, "test_map_create__open failed"))
+ return;
+
+ err = test_map_create__load(skel);
+ if (!ASSERT_OK(err, "test_map_create__load failed"))
+ goto cleanup;
+
+ fd = bpf_map__fd(skel->maps.map1);
+ if (!ASSERT_GT(fd, 0, "bpf_map__fd failed"))
+ goto cleanup;
+ close(fd);
+
+ fd = bpf_map__fd(skel->maps.map2);
+ if (!ASSERT_GT(fd, 0, "bpf_map__fd failed"))
+ goto cleanup;
+ close(fd);
+
+ fd = bpf_map__fd(skel->maps.map3);
+ if (!ASSERT_GT(fd, 0, "bpf_map__fd failed"))
+ goto cleanup;
+ close(fd);
+
+ fd = bpf_map__fd(skel->maps.map4);
+ if (!ASSERT_GT(fd, 0, "bpf_map__fd failed"))
+ goto cleanup;
+ close(fd);
+
+ fd = bpf_map__fd(skel->maps.map5);
+ if (!ASSERT_GT(fd, 0, "bpf_map__fd failed"))
+ goto cleanup;
+ close(fd);
+
+ fd = bpf_map__fd(skel->maps.map6);
+ if (!ASSERT_GT(fd, 0, "bpf_map__fd failed"))
+ goto cleanup;
+ close(fd);
+
+ fd = bpf_map__fd(skel->maps.map7);
+ if (!ASSERT_GT(fd, 0, "bpf_map__fd failed"))
+ goto cleanup;
+ close(fd);
+
+ fd = bpf_map__fd(skel->maps.map8);
+ if (!ASSERT_GT(fd, 0, "bpf_map__fd failed"))
+ goto cleanup;
+ close(fd);
+
+ fd = bpf_map__fd(skel->maps.map9);
+ if (!ASSERT_GT(fd, 0, "bpf_map__fd failed"))
+ goto cleanup;
+ close(fd);
+
+ fd = bpf_map__fd(skel->maps.map10);
+ if (!ASSERT_GT(fd, 0, "bpf_map__fd failed"))
+ goto cleanup;
+ close(fd);
+
+ fd = bpf_map__fd(skel->maps.map11);
+ if (!ASSERT_GT(fd, 0, "bpf_map__fd failed"))
+ goto cleanup;
+ close(fd);
+
+ fd = bpf_map__fd(skel->maps.map12);
+ if (!ASSERT_GT(fd, 0, "bpf_map__fd failed"))
+ goto cleanup;
+ close(fd);
+
+ fd = bpf_map__fd(skel->maps.map13);
+ if (!ASSERT_GT(fd, 0, "bpf_map__fd failed"))
+ goto cleanup;
+ close(fd);
+
+cleanup:
+ test_map_create__destroy(skel);
+}
diff --git a/tools/testing/selftests/bpf/progs/test_map_create.c b/tools/testing/selftests/bpf/progs/test_map_create.c
new file mode 100644
index 000000000000..2e9950e56b0f
--- /dev/null
+++ b/tools/testing/selftests/bpf/progs/test_map_create.c
@@ -0,0 +1,110 @@
+/* SPDX-License-Identifier: GPL-2.0 */
+/* Copyright (c) 2021 Hengqi Chen */
+
+#include "vmlinux.h"
+#include <bpf/bpf_helpers.h>
+
+#define MAX_ENTRIES 8
+
+struct {
+ __uint(type,BPF_MAP_TYPE_PERF_EVENT_ARRAY);
+ __uint(max_entries, MAX_ENTRIES);
+ __type(key, int);
+ __type(value, int);
+} map1 SEC(".maps");
+
+struct {
+ __uint(type, BPF_MAP_TYPE_STACK_TRACE);
+ __uint(max_entries, MAX_ENTRIES);
+ __type(key, int);
+ __type(value, __u64);
+} map2 SEC(".maps");
+
+struct {
+ __uint(type, BPF_MAP_TYPE_CGROUP_ARRAY);
+ __uint(max_entries, MAX_ENTRIES);
+ __type(key, int);
+ __type(value, int);
+} map3 SEC(".maps");
+
+struct {
+ __uint(type, BPF_MAP_TYPE_ARRAY_OF_MAPS);
+ __uint(max_entries, MAX_ENTRIES);
+ __type(key, int);
+ __type(value, int);
+ __array(values, struct {
+ __uint(type, BPF_MAP_TYPE_ARRAY);
+ __uint(max_entries, 1);
+ __type(key, __u32);
+ __type(value, __u32);
+ });
+} map4 SEC(".maps");
+
+struct {
+ __uint(type, BPF_MAP_TYPE_HASH_OF_MAPS);
+ __uint(max_entries, MAX_ENTRIES);
+ __type(key, int);
+ __type(value, int);
+ __array(values, struct {
+ __uint(type, BPF_MAP_TYPE_ARRAY);
+ __uint(max_entries, 1);
+ __type(key, __u32);
+ __type(value, __u32);
+ });
+} map5 SEC(".maps");
+
+struct {
+ __uint(type, BPF_MAP_TYPE_DEVMAP);
+ __uint(max_entries, MAX_ENTRIES);
+ __type(key, int);
+ __type(value, int);
+} map6 SEC(".maps");
+
+struct {
+ __uint(type, BPF_MAP_TYPE_SOCKMAP);
+ __uint(max_entries, MAX_ENTRIES);
+ __type(key, int);
+ __type(value, int);
+} map7 SEC(".maps");
+
+struct {
+ __uint(type, BPF_MAP_TYPE_CPUMAP);
+ __uint(max_entries, MAX_ENTRIES);
+ __type(key, int);
+ __type(value, int);
+} map8 SEC(".maps");
+
+struct {
+ __uint(type, BPF_MAP_TYPE_XSKMAP);
+ __uint(max_entries, MAX_ENTRIES);
+ __type(key, int);
+ __type(value, int);
+} map9 SEC(".maps");
+
+struct {
+ __uint(type, BPF_MAP_TYPE_SOCKHASH);
+ __uint(max_entries, MAX_ENTRIES);
+ __type(key, int);
+ __type(value, int);
+} map10 SEC(".maps");
+
+struct {
+ __uint(type, BPF_MAP_TYPE_QUEUE);
+ __uint(max_entries, MAX_ENTRIES);
+ __type(value, int);
+} map11 SEC(".maps");
+
+struct {
+ __uint(type, BPF_MAP_TYPE_STACK);
+ __uint(max_entries, MAX_ENTRIES);
+ __type(value, int);
+} map12 SEC(".maps");
+
+struct {
+ __uint(type, BPF_MAP_TYPE_DEVMAP_HASH);
+ __uint(max_entries, MAX_ENTRIES);
+ __type(key, int);
+ __type(value, int);
+} map13 SEC(".maps");
+
+char _license[] SEC("license") = "GPL";
--
2.25.1
next prev parent reply other threads:[~2021-09-05 10:09 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-09-05 10:09 [PATCH bpf-next 1/2] libbpf: Support uniform BTF-defined key/value specification across all BPF maps Hengqi Chen
2021-09-05 10:09 ` Hengqi Chen [this message]
2021-09-09 4:29 ` [PATCH bpf-next 2/2] selftests/bpf: Test BPF map creation using BTF-defined key/value Andrii Nakryiko
2021-09-30 16:05 ` Hengqi Chen
2021-09-30 18:39 ` Andrii Nakryiko
2021-10-02 16:17 ` Hengqi Chen
2021-09-09 4:26 ` [PATCH bpf-next 1/2] libbpf: Support uniform BTF-defined key/value specification across all BPF maps Andrii Nakryiko
2021-09-30 15:58 ` Hengqi Chen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20210905100914.33007-2-hengqi.chen@gmail.com \
--to=hengqi.chen@gmail.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=john.fastabend@gmail.com \
--cc=yhs@fb.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).