154359Sroberto// SPDX-License-Identifier: GPL-2.0 2182007Sroberto/* Copyright (c) 2020 Facebook */ 354359Sroberto 4182007Sroberto#include <test_progs.h> 5182007Sroberto 654359Sroberto#include "test_btf_map_in_map.skel.h" 754359Sroberto 8182007Srobertostatic int duration; 9182007Sroberto 10182007Srobertostatic __u32 bpf_map_id(struct bpf_map *map) 11182007Sroberto{ 12182007Sroberto struct bpf_map_info info; 13182007Sroberto __u32 info_len = sizeof(info); 14182007Sroberto int err; 15182007Sroberto 16182007Sroberto memset(&info, 0, info_len); 17182007Sroberto err = bpf_map_get_info_by_fd(bpf_map__fd(map), &info, &info_len); 18182007Sroberto if (err) 19182007Sroberto return 0; 20182007Sroberto return info.id; 21182007Sroberto} 22182007Sroberto 23182007Srobertostatic void test_lookup_update(void) 24182007Sroberto{ 25182007Sroberto int map1_fd, map2_fd, map3_fd, map4_fd, map5_fd, map1_id, map2_id; 26182007Sroberto int outer_arr_fd, outer_hash_fd, outer_arr_dyn_fd; 27182007Sroberto struct test_btf_map_in_map *skel; 28182007Sroberto int err, key = 0, val, i, fd; 29182007Sroberto 30182007Sroberto skel = test_btf_map_in_map__open_and_load(); 31182007Sroberto if (CHECK(!skel, "skel_open", "failed to open&load skeleton\n")) 32182007Sroberto return; 33182007Sroberto 34182007Sroberto err = test_btf_map_in_map__attach(skel); 35182007Sroberto if (CHECK(err, "skel_attach", "skeleton attach failed: %d\n", err)) 36182007Sroberto goto cleanup; 3754359Sroberto 3854359Sroberto map1_fd = bpf_map__fd(skel->maps.inner_map1); 3954359Sroberto map2_fd = bpf_map__fd(skel->maps.inner_map2); 4054359Sroberto map3_fd = bpf_map__fd(skel->maps.inner_map3); 4154359Sroberto map4_fd = bpf_map__fd(skel->maps.inner_map4); 42282408Scy map5_fd = bpf_map__fd(skel->maps.inner_map5); 43282408Scy outer_arr_dyn_fd = bpf_map__fd(skel->maps.outer_arr_dyn); 44282408Scy outer_arr_fd = bpf_map__fd(skel->maps.outer_arr); 45282408Scy outer_hash_fd = bpf_map__fd(skel->maps.outer_hash); 46282408Scy 47282408Scy /* inner1 = input, inner2 = input + 1, inner3 = input + 2 */ 48282408Scy bpf_map_update_elem(outer_arr_fd, &key, &map1_fd, 0); 49282408Scy bpf_map_update_elem(outer_hash_fd, &key, &map2_fd, 0); 50282408Scy bpf_map_update_elem(outer_arr_dyn_fd, &key, &map3_fd, 0); 51282408Scy skel->bss->input = 1; 52282408Scy usleep(1); 53282408Scy bpf_map_lookup_elem(map1_fd, &key, &val); 54282408Scy CHECK(val != 1, "inner1", "got %d != exp %d\n", val, 1); 55282408Scy bpf_map_lookup_elem(map2_fd, &key, &val); 56282408Scy CHECK(val != 2, "inner2", "got %d != exp %d\n", val, 2); 57282408Scy bpf_map_lookup_elem(map3_fd, &key, &val); 58282408Scy CHECK(val != 3, "inner3", "got %d != exp %d\n", val, 3); 59282408Scy 60282408Scy /* inner2 = input, inner1 = input + 1, inner4 = input + 2 */ 61282408Scy bpf_map_update_elem(outer_arr_fd, &key, &map2_fd, 0); 62282408Scy bpf_map_update_elem(outer_hash_fd, &key, &map1_fd, 0); 63282408Scy bpf_map_update_elem(outer_arr_dyn_fd, &key, &map4_fd, 0); 64282408Scy skel->bss->input = 3; 65282408Scy usleep(1); 66282408Scy bpf_map_lookup_elem(map1_fd, &key, &val); 67282408Scy CHECK(val != 4, "inner1", "got %d != exp %d\n", val, 4); 68282408Scy bpf_map_lookup_elem(map2_fd, &key, &val); 69282408Scy CHECK(val != 3, "inner2", "got %d != exp %d\n", val, 3); 70282408Scy bpf_map_lookup_elem(map4_fd, &key, &val); 71282408Scy CHECK(val != 5, "inner4", "got %d != exp %d\n", val, 5); 72282408Scy 7354359Sroberto /* inner5 = input + 2 */ 74282408Scy bpf_map_update_elem(outer_arr_dyn_fd, &key, &map5_fd, 0); 75282408Scy skel->bss->input = 5; 76282408Scy usleep(1); 77282408Scy bpf_map_lookup_elem(map5_fd, &key, &val); 78282408Scy CHECK(val != 7, "inner5", "got %d != exp %d\n", val, 7); 79282408Scy 80282408Scy for (i = 0; i < 5; i++) { 81282408Scy val = i % 2 ? map1_fd : map2_fd; 82282408Scy err = bpf_map_update_elem(outer_hash_fd, &key, &val, 0); 83282408Scy if (CHECK_FAIL(err)) { 84282408Scy printf("failed to update hash_of_maps on iter #%d\n", i); 8554359Sroberto goto cleanup; 8654359Sroberto } 87282408Scy err = bpf_map_update_elem(outer_arr_fd, &key, &val, 0); 88282408Scy if (CHECK_FAIL(err)) { 89282408Scy printf("failed to update array_of_maps on iter #%d\n", i); 90282408Scy goto cleanup; 91282408Scy } 92282408Scy val = i % 2 ? map4_fd : map5_fd; 93282408Scy err = bpf_map_update_elem(outer_arr_dyn_fd, &key, &val, 0); 9454359Sroberto if (CHECK_FAIL(err)) { 95282408Scy printf("failed to update array_of_maps (dyn) on iter #%d\n", i); 96282408Scy goto cleanup; 97282408Scy } 98282408Scy } 99282408Scy 100282408Scy map1_id = bpf_map_id(skel->maps.inner_map1); 101282408Scy map2_id = bpf_map_id(skel->maps.inner_map2); 10254359Sroberto CHECK(map1_id == 0, "map1_id", "failed to get ID 1\n"); 103282408Scy CHECK(map2_id == 0, "map2_id", "failed to get ID 2\n"); 104282408Scy 105282408Scy test_btf_map_in_map__destroy(skel); 106282408Scy skel = NULL; 107282408Scy 108282408Scy /* we need to either wait for or force synchronize_rcu(), before 10954359Sroberto * checking for "still exists" condition, otherwise map could still be 110282408Scy * resolvable by ID, causing false positives. 111282408Scy * 112282408Scy * Older kernels (5.8 and earlier) freed map only after two 113282408Scy * synchronize_rcu()s, so trigger two, to be entirely sure. 114282408Scy */ 115282408Scy CHECK(kern_sync_rcu(), "sync_rcu", "failed\n"); 116282408Scy CHECK(kern_sync_rcu(), "sync_rcu", "failed\n"); 117282408Scy 11854359Sroberto fd = bpf_map_get_fd_by_id(map1_id); 119282408Scy if (CHECK(fd >= 0, "map1_leak", "inner_map1 leaked!\n")) { 120282408Scy close(fd); 121282408Scy goto cleanup; 122282408Scy } 123282408Scy fd = bpf_map_get_fd_by_id(map2_id); 124282408Scy if (CHECK(fd >= 0, "map2_leak", "inner_map2 leaked!\n")) { 125282408Scy close(fd); 126282408Scy goto cleanup; 127282408Scy } 128282408Scy 129282408Scycleanup: 130282408Scy test_btf_map_in_map__destroy(skel); 131282408Scy} 132282408Scy 133282408Scystatic void test_diff_size(void) 134282408Scy{ 135282408Scy struct test_btf_map_in_map *skel; 136282408Scy int err, inner_map_fd, zero = 0; 137282408Scy 138282408Scy skel = test_btf_map_in_map__open_and_load(); 139282408Scy if (CHECK(!skel, "skel_open", "failed to open&load skeleton\n")) 140282408Scy return; 141282408Scy 14254359Sroberto inner_map_fd = bpf_map__fd(skel->maps.sockarr_sz2); 14354359Sroberto err = bpf_map_update_elem(bpf_map__fd(skel->maps.outer_sockarr), &zero, 144282408Scy &inner_map_fd, 0); 145282408Scy CHECK(err, "outer_sockarr inner map size check", 146282408Scy "cannot use a different size inner_map\n"); 147282408Scy 148282408Scy inner_map_fd = bpf_map__fd(skel->maps.inner_map_sz2); 149282408Scy err = bpf_map_update_elem(bpf_map__fd(skel->maps.outer_arr), &zero, 15054359Sroberto &inner_map_fd, 0); 151282408Scy CHECK(!err, "outer_arr inner map size check", 15254359Sroberto "incorrectly updated with a different size inner_map\n"); 153282408Scy 154282408Scy test_btf_map_in_map__destroy(skel); 155282408Scy} 156282408Scy 157282408Scyvoid test_btf_map_in_map(void) 158282408Scy{ 159282408Scy if (test__start_subtest("lookup_update")) 160282408Scy test_lookup_update(); 161282408Scy 162282408Scy if (test__start_subtest("diff_size")) 163282408Scy test_diff_size(); 164282408Scy} 165282408Scy