154359Sroberto// SPDX-License-Identifier: GPL-2.0
2182007Sroberto/* Copyright (c) 2020 Facebook */
354359Sroberto
4182007Sroberto#include <test_progs.h>
5182007Sroberto
654359Sroberto#include "test_btf_map_in_map.skel.h"
754359Sroberto
8182007Srobertostatic int duration;
9182007Sroberto
10182007Srobertostatic __u32 bpf_map_id(struct bpf_map *map)
11182007Sroberto{
12182007Sroberto	struct bpf_map_info info;
13182007Sroberto	__u32 info_len = sizeof(info);
14182007Sroberto	int err;
15182007Sroberto
16182007Sroberto	memset(&info, 0, info_len);
17182007Sroberto	err = bpf_map_get_info_by_fd(bpf_map__fd(map), &info, &info_len);
18182007Sroberto	if (err)
19182007Sroberto		return 0;
20182007Sroberto	return info.id;
21182007Sroberto}
22182007Sroberto
23182007Srobertostatic void test_lookup_update(void)
24182007Sroberto{
25182007Sroberto	int map1_fd, map2_fd, map3_fd, map4_fd, map5_fd, map1_id, map2_id;
26182007Sroberto	int outer_arr_fd, outer_hash_fd, outer_arr_dyn_fd;
27182007Sroberto	struct test_btf_map_in_map *skel;
28182007Sroberto	int err, key = 0, val, i, fd;
29182007Sroberto
30182007Sroberto	skel = test_btf_map_in_map__open_and_load();
31182007Sroberto	if (CHECK(!skel, "skel_open", "failed to open&load skeleton\n"))
32182007Sroberto		return;
33182007Sroberto
34182007Sroberto	err = test_btf_map_in_map__attach(skel);
35182007Sroberto	if (CHECK(err, "skel_attach", "skeleton attach failed: %d\n", err))
36182007Sroberto		goto cleanup;
3754359Sroberto
3854359Sroberto	map1_fd = bpf_map__fd(skel->maps.inner_map1);
3954359Sroberto	map2_fd = bpf_map__fd(skel->maps.inner_map2);
4054359Sroberto	map3_fd = bpf_map__fd(skel->maps.inner_map3);
4154359Sroberto	map4_fd = bpf_map__fd(skel->maps.inner_map4);
42282408Scy	map5_fd = bpf_map__fd(skel->maps.inner_map5);
43282408Scy	outer_arr_dyn_fd = bpf_map__fd(skel->maps.outer_arr_dyn);
44282408Scy	outer_arr_fd = bpf_map__fd(skel->maps.outer_arr);
45282408Scy	outer_hash_fd = bpf_map__fd(skel->maps.outer_hash);
46282408Scy
47282408Scy	/* inner1 = input, inner2 = input + 1, inner3 = input + 2 */
48282408Scy	bpf_map_update_elem(outer_arr_fd, &key, &map1_fd, 0);
49282408Scy	bpf_map_update_elem(outer_hash_fd, &key, &map2_fd, 0);
50282408Scy	bpf_map_update_elem(outer_arr_dyn_fd, &key, &map3_fd, 0);
51282408Scy	skel->bss->input = 1;
52282408Scy	usleep(1);
53282408Scy	bpf_map_lookup_elem(map1_fd, &key, &val);
54282408Scy	CHECK(val != 1, "inner1", "got %d != exp %d\n", val, 1);
55282408Scy	bpf_map_lookup_elem(map2_fd, &key, &val);
56282408Scy	CHECK(val != 2, "inner2", "got %d != exp %d\n", val, 2);
57282408Scy	bpf_map_lookup_elem(map3_fd, &key, &val);
58282408Scy	CHECK(val != 3, "inner3", "got %d != exp %d\n", val, 3);
59282408Scy
60282408Scy	/* inner2 = input, inner1 = input + 1, inner4 = input + 2 */
61282408Scy	bpf_map_update_elem(outer_arr_fd, &key, &map2_fd, 0);
62282408Scy	bpf_map_update_elem(outer_hash_fd, &key, &map1_fd, 0);
63282408Scy	bpf_map_update_elem(outer_arr_dyn_fd, &key, &map4_fd, 0);
64282408Scy	skel->bss->input = 3;
65282408Scy	usleep(1);
66282408Scy	bpf_map_lookup_elem(map1_fd, &key, &val);
67282408Scy	CHECK(val != 4, "inner1", "got %d != exp %d\n", val, 4);
68282408Scy	bpf_map_lookup_elem(map2_fd, &key, &val);
69282408Scy	CHECK(val != 3, "inner2", "got %d != exp %d\n", val, 3);
70282408Scy	bpf_map_lookup_elem(map4_fd, &key, &val);
71282408Scy	CHECK(val != 5, "inner4", "got %d != exp %d\n", val, 5);
72282408Scy
7354359Sroberto	/* inner5 = input + 2 */
74282408Scy	bpf_map_update_elem(outer_arr_dyn_fd, &key, &map5_fd, 0);
75282408Scy	skel->bss->input = 5;
76282408Scy	usleep(1);
77282408Scy	bpf_map_lookup_elem(map5_fd, &key, &val);
78282408Scy	CHECK(val != 7, "inner5", "got %d != exp %d\n", val, 7);
79282408Scy
80282408Scy	for (i = 0; i < 5; i++) {
81282408Scy		val = i % 2 ? map1_fd : map2_fd;
82282408Scy		err = bpf_map_update_elem(outer_hash_fd, &key, &val, 0);
83282408Scy		if (CHECK_FAIL(err)) {
84282408Scy			printf("failed to update hash_of_maps on iter #%d\n", i);
8554359Sroberto			goto cleanup;
8654359Sroberto		}
87282408Scy		err = bpf_map_update_elem(outer_arr_fd, &key, &val, 0);
88282408Scy		if (CHECK_FAIL(err)) {
89282408Scy			printf("failed to update array_of_maps on iter #%d\n", i);
90282408Scy			goto cleanup;
91282408Scy		}
92282408Scy		val = i % 2 ? map4_fd : map5_fd;
93282408Scy		err = bpf_map_update_elem(outer_arr_dyn_fd, &key, &val, 0);
9454359Sroberto		if (CHECK_FAIL(err)) {
95282408Scy			printf("failed to update array_of_maps (dyn) on iter #%d\n", i);
96282408Scy			goto cleanup;
97282408Scy		}
98282408Scy	}
99282408Scy
100282408Scy	map1_id = bpf_map_id(skel->maps.inner_map1);
101282408Scy	map2_id = bpf_map_id(skel->maps.inner_map2);
10254359Sroberto	CHECK(map1_id == 0, "map1_id", "failed to get ID 1\n");
103282408Scy	CHECK(map2_id == 0, "map2_id", "failed to get ID 2\n");
104282408Scy
105282408Scy	test_btf_map_in_map__destroy(skel);
106282408Scy	skel = NULL;
107282408Scy
108282408Scy	/* we need to either wait for or force synchronize_rcu(), before
10954359Sroberto	 * checking for "still exists" condition, otherwise map could still be
110282408Scy	 * resolvable by ID, causing false positives.
111282408Scy	 *
112282408Scy	 * Older kernels (5.8 and earlier) freed map only after two
113282408Scy	 * synchronize_rcu()s, so trigger two, to be entirely sure.
114282408Scy	 */
115282408Scy	CHECK(kern_sync_rcu(), "sync_rcu", "failed\n");
116282408Scy	CHECK(kern_sync_rcu(), "sync_rcu", "failed\n");
117282408Scy
11854359Sroberto	fd = bpf_map_get_fd_by_id(map1_id);
119282408Scy	if (CHECK(fd >= 0, "map1_leak", "inner_map1 leaked!\n")) {
120282408Scy		close(fd);
121282408Scy		goto cleanup;
122282408Scy	}
123282408Scy	fd = bpf_map_get_fd_by_id(map2_id);
124282408Scy	if (CHECK(fd >= 0, "map2_leak", "inner_map2 leaked!\n")) {
125282408Scy		close(fd);
126282408Scy		goto cleanup;
127282408Scy	}
128282408Scy
129282408Scycleanup:
130282408Scy	test_btf_map_in_map__destroy(skel);
131282408Scy}
132282408Scy
133282408Scystatic void test_diff_size(void)
134282408Scy{
135282408Scy	struct test_btf_map_in_map *skel;
136282408Scy	int err, inner_map_fd, zero = 0;
137282408Scy
138282408Scy	skel = test_btf_map_in_map__open_and_load();
139282408Scy	if (CHECK(!skel, "skel_open", "failed to open&load skeleton\n"))
140282408Scy		return;
141282408Scy
14254359Sroberto	inner_map_fd = bpf_map__fd(skel->maps.sockarr_sz2);
14354359Sroberto	err = bpf_map_update_elem(bpf_map__fd(skel->maps.outer_sockarr), &zero,
144282408Scy				  &inner_map_fd, 0);
145282408Scy	CHECK(err, "outer_sockarr inner map size check",
146282408Scy	      "cannot use a different size inner_map\n");
147282408Scy
148282408Scy	inner_map_fd = bpf_map__fd(skel->maps.inner_map_sz2);
149282408Scy	err = bpf_map_update_elem(bpf_map__fd(skel->maps.outer_arr), &zero,
15054359Sroberto				  &inner_map_fd, 0);
151282408Scy	CHECK(!err, "outer_arr inner map size check",
15254359Sroberto	      "incorrectly updated with a different size inner_map\n");
153282408Scy
154282408Scy	test_btf_map_in_map__destroy(skel);
155282408Scy}
156282408Scy
157282408Scyvoid test_btf_map_in_map(void)
158282408Scy{
159282408Scy	if (test__start_subtest("lookup_update"))
160282408Scy		test_lookup_update();
161282408Scy
162282408Scy	if (test__start_subtest("diff_size"))
163282408Scy		test_diff_size();
164282408Scy}
165282408Scy