mirror of
https://github.com/edk2-porting/linux-next.git
synced 2025-01-13 16:14:26 +08:00
selftests: bpf: break up test_progs - pkt access
Move pkt access prog tests into separate files. Signed-off-by: Stanislav Fomichev <sdf@google.com> Signed-off-by: Alexei Starovoitov <ast@kernel.org>
This commit is contained in:
parent
3f30658830
commit
7395724b40
29
tools/testing/selftests/bpf/prog_tests/pkt_access.c
Normal file
29
tools/testing/selftests/bpf/prog_tests/pkt_access.c
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
// SPDX-License-Identifier: GPL-2.0
|
||||||
|
#include <test_progs.h>
|
||||||
|
|
||||||
|
void test_pkt_access(void)
|
||||||
|
{
|
||||||
|
const char *file = "./test_pkt_access.o";
|
||||||
|
struct bpf_object *obj;
|
||||||
|
__u32 duration, retval;
|
||||||
|
int err, prog_fd;
|
||||||
|
|
||||||
|
err = bpf_prog_load(file, BPF_PROG_TYPE_SCHED_CLS, &obj, &prog_fd);
|
||||||
|
if (err) {
|
||||||
|
error_cnt++;
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
err = bpf_prog_test_run(prog_fd, 100000, &pkt_v4, sizeof(pkt_v4),
|
||||||
|
NULL, NULL, &retval, &duration);
|
||||||
|
CHECK(err || retval, "ipv4",
|
||||||
|
"err %d errno %d retval %d duration %d\n",
|
||||||
|
err, errno, retval, duration);
|
||||||
|
|
||||||
|
err = bpf_prog_test_run(prog_fd, 100000, &pkt_v6, sizeof(pkt_v6),
|
||||||
|
NULL, NULL, &retval, &duration);
|
||||||
|
CHECK(err || retval, "ipv6",
|
||||||
|
"err %d errno %d retval %d duration %d\n",
|
||||||
|
err, errno, retval, duration);
|
||||||
|
bpf_object__close(obj);
|
||||||
|
}
|
24
tools/testing/selftests/bpf/prog_tests/pkt_md_access.c
Normal file
24
tools/testing/selftests/bpf/prog_tests/pkt_md_access.c
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
// SPDX-License-Identifier: GPL-2.0
|
||||||
|
#include <test_progs.h>
|
||||||
|
|
||||||
|
void test_pkt_md_access(void)
|
||||||
|
{
|
||||||
|
const char *file = "./test_pkt_md_access.o";
|
||||||
|
struct bpf_object *obj;
|
||||||
|
__u32 duration, retval;
|
||||||
|
int err, prog_fd;
|
||||||
|
|
||||||
|
err = bpf_prog_load(file, BPF_PROG_TYPE_SCHED_CLS, &obj, &prog_fd);
|
||||||
|
if (err) {
|
||||||
|
error_cnt++;
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
err = bpf_prog_test_run(prog_fd, 10, &pkt_v4, sizeof(pkt_v4),
|
||||||
|
NULL, NULL, &retval, &duration);
|
||||||
|
CHECK(err || retval, "",
|
||||||
|
"err %d errno %d retval %d duration %d\n",
|
||||||
|
err, errno, retval, duration);
|
||||||
|
|
||||||
|
bpf_object__close(obj);
|
||||||
|
}
|
@ -40,33 +40,6 @@ int bpf_find_map(const char *test, struct bpf_object *obj, const char *name)
|
|||||||
return bpf_map__fd(map);
|
return bpf_map__fd(map);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void test_pkt_access(void)
|
|
||||||
{
|
|
||||||
const char *file = "./test_pkt_access.o";
|
|
||||||
struct bpf_object *obj;
|
|
||||||
__u32 duration, retval;
|
|
||||||
int err, prog_fd;
|
|
||||||
|
|
||||||
err = bpf_prog_load(file, BPF_PROG_TYPE_SCHED_CLS, &obj, &prog_fd);
|
|
||||||
if (err) {
|
|
||||||
error_cnt++;
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
err = bpf_prog_test_run(prog_fd, 100000, &pkt_v4, sizeof(pkt_v4),
|
|
||||||
NULL, NULL, &retval, &duration);
|
|
||||||
CHECK(err || retval, "ipv4",
|
|
||||||
"err %d errno %d retval %d duration %d\n",
|
|
||||||
err, errno, retval, duration);
|
|
||||||
|
|
||||||
err = bpf_prog_test_run(prog_fd, 100000, &pkt_v6, sizeof(pkt_v6),
|
|
||||||
NULL, NULL, &retval, &duration);
|
|
||||||
CHECK(err || retval, "ipv6",
|
|
||||||
"err %d errno %d retval %d duration %d\n",
|
|
||||||
err, errno, retval, duration);
|
|
||||||
bpf_object__close(obj);
|
|
||||||
}
|
|
||||||
|
|
||||||
static void test_prog_run_xattr(void)
|
static void test_prog_run_xattr(void)
|
||||||
{
|
{
|
||||||
const char *file = "./test_pkt_access.o";
|
const char *file = "./test_pkt_access.o";
|
||||||
@ -648,28 +621,6 @@ done:
|
|||||||
bpf_object__close(objs[i]);
|
bpf_object__close(objs[i]);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void test_pkt_md_access(void)
|
|
||||||
{
|
|
||||||
const char *file = "./test_pkt_md_access.o";
|
|
||||||
struct bpf_object *obj;
|
|
||||||
__u32 duration, retval;
|
|
||||||
int err, prog_fd;
|
|
||||||
|
|
||||||
err = bpf_prog_load(file, BPF_PROG_TYPE_SCHED_CLS, &obj, &prog_fd);
|
|
||||||
if (err) {
|
|
||||||
error_cnt++;
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
err = bpf_prog_test_run(prog_fd, 10, &pkt_v4, sizeof(pkt_v4),
|
|
||||||
NULL, NULL, &retval, &duration);
|
|
||||||
CHECK(err || retval, "",
|
|
||||||
"err %d errno %d retval %d duration %d\n",
|
|
||||||
err, errno, retval, duration);
|
|
||||||
|
|
||||||
bpf_object__close(obj);
|
|
||||||
}
|
|
||||||
|
|
||||||
static void test_obj_name(void)
|
static void test_obj_name(void)
|
||||||
{
|
{
|
||||||
struct {
|
struct {
|
||||||
@ -2095,7 +2046,6 @@ int main(void)
|
|||||||
#define CALL
|
#define CALL
|
||||||
#include <prog_tests/tests.h>
|
#include <prog_tests/tests.h>
|
||||||
#undef CALL
|
#undef CALL
|
||||||
test_pkt_access();
|
|
||||||
test_prog_run_xattr();
|
test_prog_run_xattr();
|
||||||
test_xdp();
|
test_xdp();
|
||||||
test_xdp_adjust_tail();
|
test_xdp_adjust_tail();
|
||||||
@ -2103,7 +2053,6 @@ int main(void)
|
|||||||
test_xdp_noinline();
|
test_xdp_noinline();
|
||||||
test_tcp_estats();
|
test_tcp_estats();
|
||||||
test_bpf_obj_id();
|
test_bpf_obj_id();
|
||||||
test_pkt_md_access();
|
|
||||||
test_obj_name();
|
test_obj_name();
|
||||||
test_tp_attach_query();
|
test_tp_attach_query();
|
||||||
test_stacktrace_map();
|
test_stacktrace_map();
|
||||||
|
Loading…
Reference in New Issue
Block a user