Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp3570929ybc; Mon, 18 Nov 2019 17:47:09 -0800 (PST) X-Google-Smtp-Source: APXvYqyWIUOzMMjLReC+NCpWPEgkudjJlzbOwgezhmakPWg7cNz7A68XRP0sz0+6aqfxQxdiwuji X-Received: by 2002:a17:906:7e08:: with SMTP id e8mr31201497ejr.199.1574128028971; Mon, 18 Nov 2019 17:47:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574128028; cv=none; d=google.com; s=arc-20160816; b=Hq7y6cQEXdKfPql3/EifeK3ICGgsxzUYwDi/VPnXteSokznEVidbAu79an4+uLuKMM LlYjojUOrh19MtwFpimcmYLFjeit7DrgEIpaZM/0BP5GEmYqSUZMQarabfYAbix+uAjb uq9YCbEz/98mUX7yNHLMbz7hmv/K8rocrPr0leNU1A89LK1L/lBKwdMHG4kLKsTLpO4I llq7HSHWPshsRUGF5Tpdk6dHCrms2ivORL3uxriFbmRigII1VnwUMUuye5PubdLr6+N5 nEJxDDitVILllwLRto/hZiNBC3pTh6XzqjFdLZV014dgKD7JZKZD++vjI9tQGfc3SMW6 s8Iw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:references :mime-version:message-id:in-reply-to:date:dkim-signature; bh=vOGdWKkLZw+fnwsKztc5Xhx6sgiytcIM3uQq3wSpoPY=; b=JIYyNqp41OjryxhB3dLaAwZXNfqz0G34g2OE6qRBSgyCm6eo1nXnYgN2HahHtCyRFA Pvkgh9Yz7sKE2qkkKyqZjwMGsO98Koo5C/Bhhvzn/Q42qR0jGTRAseDwVvJ25U2lcBgg 22bQfWk1UVraMI0M6+rrh7kPRWQOTlP670YDvTNA7GKSBLTEy85akdRK7oiKl6CInl9S LP/wyUOdROYNv0j+CWrrPdb2bhEsRuVDLkoboWgJ/OKyYi6+tTEBOy5TYo2+wg7P3VIB hhSn+1anEZYW+MBUFVAmztDBF+dzAM2tCo38WkBn/fF+Lozia8ae4HDqUWANlhuisdt0 2KFg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=ae7SAUyR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p24si4937589edu.216.2019.11.18.17.46.44; Mon, 18 Nov 2019 17:47:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=ae7SAUyR; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727486AbfKSBos (ORCPT + 99 others); Mon, 18 Nov 2019 20:44:48 -0500 Received: from mail-pl1-f202.google.com ([209.85.214.202]:47236 "EHLO mail-pl1-f202.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727427AbfKSBoh (ORCPT ); Mon, 18 Nov 2019 20:44:37 -0500 Received: by mail-pl1-f202.google.com with SMTP id p23so4472259plo.14 for ; Mon, 18 Nov 2019 17:44:37 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=vOGdWKkLZw+fnwsKztc5Xhx6sgiytcIM3uQq3wSpoPY=; b=ae7SAUyRl+afwJjPYWHUh238QkT8TPlv+uLlQdmyNQJZlTCOIWGSZlOKTEetLzBhCy Coeco7M+ofuKsaMhZTUwJih265NFLB0rweLZkM+o9afBA5bmO9Squatev3m2zgfxzecb sZI/bTHikAvdCvLfQkCbI6aUhs5z6mRO50dq/9rUpMrz4teQKs1I6f2hymSIv58HUvfU aasXDfIesdHIwA+aZzk11ZUiumZGY8hk5egqYlMrEWzctBBBvQX5y64LKMQwB4vcMmpf lRKRp9LJlDwUxYTclvvh4N5AxQgOpNr/Mm36deZfIgTS31+scAIIKhpRwKCZnMO9O/P1 fsQA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=vOGdWKkLZw+fnwsKztc5Xhx6sgiytcIM3uQq3wSpoPY=; b=UvFSE9g1ynwyjP23l3aYtYh9axRTYlc0PVFaNsjQtQs8n1XUHtCiSXT78plrBczmDT WK9glCGuY4CU5SBFlcqihldhNlQUIQM9A9sP3hWhnNqGqElpT6o8cTyzk8G9LIugXbvn u7kdOv3lq2l4VlxioTqknA7mtADHhJBlzHHov2a8vycOhzs4iJTrDmUUsdEO6PFd/goX teIdPyQRXpLKsIr3nGf2ojQNxWbSIK9l1r30tuYA0U1D0mjn7xfwp35F86ERDbT6LjCx ZOkP5jTLq4xYI8iN7DnzCvh/JXIv67ps659xX2GeUsmbmrJpscc1jqK8IPHvMDl+OC5k Yy4w== X-Gm-Message-State: APjAAAXXEBMEtA+07H46sbWc0706lUUG1LgaS9jE3dlzXYVR2qm9nMOI poQJ7FSyq56qjXlH9gBen6kepWSvl1bM X-Received: by 2002:a63:a05c:: with SMTP id u28mr2703600pgn.333.1574127876542; Mon, 18 Nov 2019 17:44:36 -0800 (PST) Date: Mon, 18 Nov 2019 17:43:57 -0800 In-Reply-To: <20191119014357.98465-1-brianvv@google.com> Message-Id: <20191119014357.98465-10-brianvv@google.com> Mime-Version: 1.0 References: <20191119014357.98465-1-brianvv@google.com> X-Mailer: git-send-email 2.24.0.432.g9d3f5f5b63-goog Subject: [PATCH bpf-next 9/9] selftests/bpf: add batch ops testing to array bpf map From: Brian Vazquez To: Brian Vazquez , Alexei Starovoitov , Daniel Borkmann , "David S . Miller" Cc: Yonghong Song , Stanislav Fomichev , Petar Penkov , Willem de Bruijn , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org, Brian Vazquez Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Tested bpf_map_lookup_batch() and bpf_map_update_batch() functionality. $ ./test_maps ... test_map_lookup_and_delete_batch_array:PASS ... Signed-off-by: Brian Vazquez Signed-off-by: Yonghong Song --- .../map_lookup_and_delete_batch_array.c | 119 ++++++++++++++++++ 1 file changed, 119 insertions(+) create mode 100644 tools/testing/selftests/bpf/map_tests/map_lookup_and_delete_batch_array.c diff --git a/tools/testing/selftests/bpf/map_tests/map_lookup_and_delete_batch_array.c b/tools/testing/selftests/bpf/map_tests/map_lookup_and_delete_batch_array.c new file mode 100644 index 0000000000000..cbec72ad38609 --- /dev/null +++ b/tools/testing/selftests/bpf/map_tests/map_lookup_and_delete_batch_array.c @@ -0,0 +1,119 @@ +// SPDX-License-Identifier: GPL-2.0 + +#include +#include +#include + +#include +#include + +#include + +static void map_batch_update(int map_fd, __u32 max_entries, int *keys, + int *values) +{ + int i, err; + + for (i = 0; i < max_entries; i++) { + keys[i] = i; + values[i] = i + 1; + } + + err = bpf_map_update_batch(map_fd, keys, values, &max_entries, 0, 0); + CHECK(err, "bpf_map_update_batch()", "error:%s\n", strerror(errno)); +} + +static void map_batch_verify(int *visited, __u32 max_entries, + int *keys, int *values) +{ + int i; + + memset(visited, 0, max_entries * sizeof(*visited)); + for (i = 0; i < max_entries; i++) { + CHECK(keys[i] + 1 != values[i], "key/value checking", + "error: i %d key %d value %d\n", i, keys[i], values[i]); + visited[i] = 1; + } + for (i = 0; i < max_entries; i++) { + CHECK(visited[i] != 1, "visited checking", + "error: keys array at index %d missing\n", i); + } +} + +void test_map_lookup_and_delete_batch_array(void) +{ + struct bpf_create_map_attr xattr = { + .name = "array_map", + .map_type = BPF_MAP_TYPE_ARRAY, + .key_size = sizeof(int), + .value_size = sizeof(int), + }; + int map_fd, *keys, *values, *visited; + __u32 count, total, total_success; + const __u32 max_entries = 10; + int err, i, step; + bool nospace_err; + __u64 batch = 0; + + xattr.max_entries = max_entries; + map_fd = bpf_create_map_xattr(&xattr); + CHECK(map_fd == -1, + "bpf_create_map_xattr()", "error:%s\n", strerror(errno)); + + keys = malloc(max_entries * sizeof(int)); + values = malloc(max_entries * sizeof(int)); + visited = malloc(max_entries * sizeof(int)); + CHECK(!keys || !values || !visited, "malloc()", "error:%s\n", + strerror(errno)); + + /* populate elements to the map */ + map_batch_update(map_fd, max_entries, keys, values); + + /* test 1: lookup in a loop with various steps. */ + total_success = 0; + for (step = 1; step < max_entries; step++) { + map_batch_update(map_fd, max_entries, keys, values); + memset(keys, 0, max_entries * sizeof(*keys)); + memset(values, 0, max_entries * sizeof(*values)); + batch = 0; + total = 0; + i = 0; + /* iteratively lookup/delete elements with 'step' + * elements each. + */ + count = step; + nospace_err = false; + while (true) { + err = bpf_map_lookup_batch(map_fd, + total ? &batch : NULL, &batch, + keys + total, + values + total, + &count, 0, 0); + + CHECK((err && errno != ENOENT), "lookup with steps", + "error: %s\n", strerror(errno)); + + total += count; + + if (err) + break; + + i++; + } + + if (nospace_err == true) + continue; + + CHECK(total != max_entries, "lookup with steps", + "total = %u, max_entries = %u\n", total, max_entries); + + map_batch_verify(visited, max_entries, keys, values); + + total_success++; + } + + CHECK(total_success == 0, "check total_success", + "unexpected failure\n"); + + printf("%s:PASS\n", __func__); +} -- 2.24.0.432.g9d3f5f5b63-goog