blob: 040356ecc862b6f87a7ff841c19b98afd3098fb3 [file] [log] [blame]
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +02001/*
2 * Testsuite for eBPF maps
3 *
4 * Copyright (c) 2014 PLUMgrid, http://plumgrid.com
5 * Copyright (c) 2016 Facebook
6 *
7 * This program is free software; you can redistribute it and/or
8 * modify it under the terms of version 2 of the GNU General Public
9 * License as published by the Free Software Foundation.
10 */
11
12#include <stdio.h>
13#include <unistd.h>
14#include <errno.h>
15#include <string.h>
16#include <assert.h>
17#include <stdlib.h>
18
19#include <sys/wait.h>
20#include <sys/resource.h>
21
22#include <linux/bpf.h>
23
Mickaël Salaün10ecc722017-02-10 00:21:39 +010024#include <bpf/bpf.h>
John Fastabend6f6d33f2017-08-15 22:34:22 -070025#include <bpf/libbpf.h>
Daniel Borkmanne00c7b22016-11-26 01:28:09 +010026#include "bpf_util.h"
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +020027
28static int map_flags;
29
30static void test_hashmap(int task, void *data)
31{
Teng Qin8fe45922017-04-24 19:00:37 -070032 long long key, next_key, first_key, value;
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +020033 int fd;
34
Mickaël Salaünf4874d02017-02-10 00:21:43 +010035 fd = bpf_create_map(BPF_MAP_TYPE_HASH, sizeof(key), sizeof(value),
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +020036 2, map_flags);
37 if (fd < 0) {
38 printf("Failed to create hashmap '%s'!\n", strerror(errno));
39 exit(1);
40 }
41
42 key = 1;
43 value = 1234;
44 /* Insert key=1 element. */
Mickaël Salaün10ecc722017-02-10 00:21:39 +010045 assert(bpf_map_update_elem(fd, &key, &value, BPF_ANY) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +020046
47 value = 0;
48 /* BPF_NOEXIST means add new element if it doesn't exist. */
Mickaël Salaün10ecc722017-02-10 00:21:39 +010049 assert(bpf_map_update_elem(fd, &key, &value, BPF_NOEXIST) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +020050 /* key=1 already exists. */
51 errno == EEXIST);
52
53 /* -1 is an invalid flag. */
Mickaël Salaün10ecc722017-02-10 00:21:39 +010054 assert(bpf_map_update_elem(fd, &key, &value, -1) == -1 &&
55 errno == EINVAL);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +020056
57 /* Check that key=1 can be found. */
Mickaël Salaüne5ff7c42017-02-10 00:21:40 +010058 assert(bpf_map_lookup_elem(fd, &key, &value) == 0 && value == 1234);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +020059
60 key = 2;
61 /* Check that key=2 is not found. */
Mickaël Salaüne5ff7c42017-02-10 00:21:40 +010062 assert(bpf_map_lookup_elem(fd, &key, &value) == -1 && errno == ENOENT);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +020063
64 /* BPF_EXIST means update existing element. */
Mickaël Salaün10ecc722017-02-10 00:21:39 +010065 assert(bpf_map_update_elem(fd, &key, &value, BPF_EXIST) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +020066 /* key=2 is not there. */
67 errno == ENOENT);
68
69 /* Insert key=2 element. */
Mickaël Salaün10ecc722017-02-10 00:21:39 +010070 assert(bpf_map_update_elem(fd, &key, &value, BPF_NOEXIST) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +020071
72 /* key=1 and key=2 were inserted, check that key=0 cannot be
73 * inserted due to max_entries limit.
74 */
75 key = 0;
Mickaël Salaün10ecc722017-02-10 00:21:39 +010076 assert(bpf_map_update_elem(fd, &key, &value, BPF_NOEXIST) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +020077 errno == E2BIG);
78
79 /* Update existing element, though the map is full. */
80 key = 1;
Mickaël Salaün10ecc722017-02-10 00:21:39 +010081 assert(bpf_map_update_elem(fd, &key, &value, BPF_EXIST) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +020082 key = 2;
Mickaël Salaün10ecc722017-02-10 00:21:39 +010083 assert(bpf_map_update_elem(fd, &key, &value, BPF_ANY) == 0);
Alexei Starovoitov8c290e62017-03-21 19:05:04 -070084 key = 3;
85 assert(bpf_map_update_elem(fd, &key, &value, BPF_NOEXIST) == -1 &&
86 errno == E2BIG);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +020087
88 /* Check that key = 0 doesn't exist. */
89 key = 0;
Mickaël Salaüne58383b2017-02-10 00:21:41 +010090 assert(bpf_map_delete_elem(fd, &key) == -1 && errno == ENOENT);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +020091
92 /* Iterate over two elements. */
Teng Qin8fe45922017-04-24 19:00:37 -070093 assert(bpf_map_get_next_key(fd, NULL, &first_key) == 0 &&
94 (first_key == 1 || first_key == 2));
Mickaël Salaün5f155c22017-02-10 00:21:42 +010095 assert(bpf_map_get_next_key(fd, &key, &next_key) == 0 &&
Teng Qin8fe45922017-04-24 19:00:37 -070096 (next_key == first_key));
Mickaël Salaün5f155c22017-02-10 00:21:42 +010097 assert(bpf_map_get_next_key(fd, &next_key, &next_key) == 0 &&
Teng Qin8fe45922017-04-24 19:00:37 -070098 (next_key == 1 || next_key == 2) &&
99 (next_key != first_key));
Mickaël Salaün5f155c22017-02-10 00:21:42 +0100100 assert(bpf_map_get_next_key(fd, &next_key, &next_key) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200101 errno == ENOENT);
102
103 /* Delete both elements. */
104 key = 1;
Mickaël Salaüne58383b2017-02-10 00:21:41 +0100105 assert(bpf_map_delete_elem(fd, &key) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200106 key = 2;
Mickaël Salaüne58383b2017-02-10 00:21:41 +0100107 assert(bpf_map_delete_elem(fd, &key) == 0);
108 assert(bpf_map_delete_elem(fd, &key) == -1 && errno == ENOENT);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200109
110 key = 0;
111 /* Check that map is empty. */
Teng Qin8fe45922017-04-24 19:00:37 -0700112 assert(bpf_map_get_next_key(fd, NULL, &next_key) == -1 &&
113 errno == ENOENT);
Mickaël Salaün5f155c22017-02-10 00:21:42 +0100114 assert(bpf_map_get_next_key(fd, &key, &next_key) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200115 errno == ENOENT);
116
117 close(fd);
118}
119
Alexei Starovoitov8c290e62017-03-21 19:05:04 -0700120static void test_hashmap_sizes(int task, void *data)
121{
122 int fd, i, j;
123
124 for (i = 1; i <= 512; i <<= 1)
125 for (j = 1; j <= 1 << 18; j <<= 1) {
126 fd = bpf_create_map(BPF_MAP_TYPE_HASH, i, j,
127 2, map_flags);
128 if (fd < 0) {
129 printf("Failed to create hashmap key=%d value=%d '%s'\n",
130 i, j, strerror(errno));
131 exit(1);
132 }
133 close(fd);
134 usleep(10); /* give kernel time to destroy */
135 }
136}
137
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200138static void test_hashmap_percpu(int task, void *data)
139{
Daniel Borkmanne00c7b22016-11-26 01:28:09 +0100140 unsigned int nr_cpus = bpf_num_possible_cpus();
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200141 BPF_DECLARE_PERCPU(long, value);
Teng Qin8fe45922017-04-24 19:00:37 -0700142 long long key, next_key, first_key;
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200143 int expected_key_mask = 0;
144 int fd, i;
145
Mickaël Salaünf4874d02017-02-10 00:21:43 +0100146 fd = bpf_create_map(BPF_MAP_TYPE_PERCPU_HASH, sizeof(key),
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200147 sizeof(bpf_percpu(value, 0)), 2, map_flags);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200148 if (fd < 0) {
149 printf("Failed to create hashmap '%s'!\n", strerror(errno));
150 exit(1);
151 }
152
153 for (i = 0; i < nr_cpus; i++)
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200154 bpf_percpu(value, i) = i + 100;
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200155
156 key = 1;
157 /* Insert key=1 element. */
158 assert(!(expected_key_mask & key));
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100159 assert(bpf_map_update_elem(fd, &key, value, BPF_ANY) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200160 expected_key_mask |= key;
161
162 /* BPF_NOEXIST means add new element if it doesn't exist. */
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100163 assert(bpf_map_update_elem(fd, &key, value, BPF_NOEXIST) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200164 /* key=1 already exists. */
165 errno == EEXIST);
166
167 /* -1 is an invalid flag. */
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100168 assert(bpf_map_update_elem(fd, &key, value, -1) == -1 &&
169 errno == EINVAL);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200170
171 /* Check that key=1 can be found. Value could be 0 if the lookup
172 * was run from a different CPU.
173 */
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200174 bpf_percpu(value, 0) = 1;
175 assert(bpf_map_lookup_elem(fd, &key, value) == 0 &&
176 bpf_percpu(value, 0) == 100);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200177
178 key = 2;
179 /* Check that key=2 is not found. */
Mickaël Salaüne5ff7c42017-02-10 00:21:40 +0100180 assert(bpf_map_lookup_elem(fd, &key, value) == -1 && errno == ENOENT);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200181
182 /* BPF_EXIST means update existing element. */
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100183 assert(bpf_map_update_elem(fd, &key, value, BPF_EXIST) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200184 /* key=2 is not there. */
185 errno == ENOENT);
186
187 /* Insert key=2 element. */
188 assert(!(expected_key_mask & key));
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100189 assert(bpf_map_update_elem(fd, &key, value, BPF_NOEXIST) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200190 expected_key_mask |= key;
191
192 /* key=1 and key=2 were inserted, check that key=0 cannot be
193 * inserted due to max_entries limit.
194 */
195 key = 0;
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100196 assert(bpf_map_update_elem(fd, &key, value, BPF_NOEXIST) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200197 errno == E2BIG);
198
199 /* Check that key = 0 doesn't exist. */
Mickaël Salaüne58383b2017-02-10 00:21:41 +0100200 assert(bpf_map_delete_elem(fd, &key) == -1 && errno == ENOENT);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200201
202 /* Iterate over two elements. */
Teng Qin8fe45922017-04-24 19:00:37 -0700203 assert(bpf_map_get_next_key(fd, NULL, &first_key) == 0 &&
204 ((expected_key_mask & first_key) == first_key));
Mickaël Salaün5f155c22017-02-10 00:21:42 +0100205 while (!bpf_map_get_next_key(fd, &key, &next_key)) {
Teng Qin8fe45922017-04-24 19:00:37 -0700206 if (first_key) {
207 assert(next_key == first_key);
208 first_key = 0;
209 }
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200210 assert((expected_key_mask & next_key) == next_key);
211 expected_key_mask &= ~next_key;
212
Mickaël Salaüne5ff7c42017-02-10 00:21:40 +0100213 assert(bpf_map_lookup_elem(fd, &next_key, value) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200214
215 for (i = 0; i < nr_cpus; i++)
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200216 assert(bpf_percpu(value, i) == i + 100);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200217
218 key = next_key;
219 }
220 assert(errno == ENOENT);
221
222 /* Update with BPF_EXIST. */
223 key = 1;
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100224 assert(bpf_map_update_elem(fd, &key, value, BPF_EXIST) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200225
226 /* Delete both elements. */
227 key = 1;
Mickaël Salaüne58383b2017-02-10 00:21:41 +0100228 assert(bpf_map_delete_elem(fd, &key) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200229 key = 2;
Mickaël Salaüne58383b2017-02-10 00:21:41 +0100230 assert(bpf_map_delete_elem(fd, &key) == 0);
231 assert(bpf_map_delete_elem(fd, &key) == -1 && errno == ENOENT);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200232
233 key = 0;
234 /* Check that map is empty. */
Teng Qin8fe45922017-04-24 19:00:37 -0700235 assert(bpf_map_get_next_key(fd, NULL, &next_key) == -1 &&
236 errno == ENOENT);
Mickaël Salaün5f155c22017-02-10 00:21:42 +0100237 assert(bpf_map_get_next_key(fd, &key, &next_key) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200238 errno == ENOENT);
239
240 close(fd);
241}
242
Daniel Borkmann5ecf51f2017-06-11 00:50:44 +0200243static void test_hashmap_walk(int task, void *data)
244{
245 int fd, i, max_entries = 100000;
246 long long key, value, next_key;
247 bool next_key_valid = true;
248
249 fd = bpf_create_map(BPF_MAP_TYPE_HASH, sizeof(key), sizeof(value),
250 max_entries, map_flags);
251 if (fd < 0) {
252 printf("Failed to create hashmap '%s'!\n", strerror(errno));
253 exit(1);
254 }
255
256 for (i = 0; i < max_entries; i++) {
257 key = i; value = key;
258 assert(bpf_map_update_elem(fd, &key, &value, BPF_NOEXIST) == 0);
259 }
260
261 for (i = 0; bpf_map_get_next_key(fd, !i ? NULL : &key,
262 &next_key) == 0; i++) {
263 key = next_key;
264 assert(bpf_map_lookup_elem(fd, &key, &value) == 0);
265 }
266
267 assert(i == max_entries);
268
269 assert(bpf_map_get_next_key(fd, NULL, &key) == 0);
270 for (i = 0; next_key_valid; i++) {
271 next_key_valid = bpf_map_get_next_key(fd, &key, &next_key) == 0;
272 assert(bpf_map_lookup_elem(fd, &key, &value) == 0);
273 value++;
274 assert(bpf_map_update_elem(fd, &key, &value, BPF_EXIST) == 0);
275 key = next_key;
276 }
277
278 assert(i == max_entries);
279
280 for (i = 0; bpf_map_get_next_key(fd, !i ? NULL : &key,
281 &next_key) == 0; i++) {
282 key = next_key;
283 assert(bpf_map_lookup_elem(fd, &key, &value) == 0);
284 assert(value - 1 == key);
285 }
286
287 assert(i == max_entries);
288 close(fd);
289}
290
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200291static void test_arraymap(int task, void *data)
292{
293 int key, next_key, fd;
294 long long value;
295
Mickaël Salaünf4874d02017-02-10 00:21:43 +0100296 fd = bpf_create_map(BPF_MAP_TYPE_ARRAY, sizeof(key), sizeof(value),
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200297 2, 0);
298 if (fd < 0) {
299 printf("Failed to create arraymap '%s'!\n", strerror(errno));
300 exit(1);
301 }
302
303 key = 1;
304 value = 1234;
305 /* Insert key=1 element. */
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100306 assert(bpf_map_update_elem(fd, &key, &value, BPF_ANY) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200307
308 value = 0;
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100309 assert(bpf_map_update_elem(fd, &key, &value, BPF_NOEXIST) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200310 errno == EEXIST);
311
312 /* Check that key=1 can be found. */
Mickaël Salaüne5ff7c42017-02-10 00:21:40 +0100313 assert(bpf_map_lookup_elem(fd, &key, &value) == 0 && value == 1234);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200314
315 key = 0;
316 /* Check that key=0 is also found and zero initialized. */
Mickaël Salaüne5ff7c42017-02-10 00:21:40 +0100317 assert(bpf_map_lookup_elem(fd, &key, &value) == 0 && value == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200318
319 /* key=0 and key=1 were inserted, check that key=2 cannot be inserted
320 * due to max_entries limit.
321 */
322 key = 2;
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100323 assert(bpf_map_update_elem(fd, &key, &value, BPF_EXIST) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200324 errno == E2BIG);
325
326 /* Check that key = 2 doesn't exist. */
Mickaël Salaüne5ff7c42017-02-10 00:21:40 +0100327 assert(bpf_map_lookup_elem(fd, &key, &value) == -1 && errno == ENOENT);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200328
329 /* Iterate over two elements. */
Teng Qin8fe45922017-04-24 19:00:37 -0700330 assert(bpf_map_get_next_key(fd, NULL, &next_key) == 0 &&
331 next_key == 0);
Mickaël Salaün5f155c22017-02-10 00:21:42 +0100332 assert(bpf_map_get_next_key(fd, &key, &next_key) == 0 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200333 next_key == 0);
Mickaël Salaün5f155c22017-02-10 00:21:42 +0100334 assert(bpf_map_get_next_key(fd, &next_key, &next_key) == 0 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200335 next_key == 1);
Mickaël Salaün5f155c22017-02-10 00:21:42 +0100336 assert(bpf_map_get_next_key(fd, &next_key, &next_key) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200337 errno == ENOENT);
338
339 /* Delete shouldn't succeed. */
340 key = 1;
Mickaël Salaüne58383b2017-02-10 00:21:41 +0100341 assert(bpf_map_delete_elem(fd, &key) == -1 && errno == EINVAL);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200342
343 close(fd);
344}
345
346static void test_arraymap_percpu(int task, void *data)
347{
Daniel Borkmanne00c7b22016-11-26 01:28:09 +0100348 unsigned int nr_cpus = bpf_num_possible_cpus();
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200349 BPF_DECLARE_PERCPU(long, values);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200350 int key, next_key, fd, i;
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200351
Mickaël Salaünf4874d02017-02-10 00:21:43 +0100352 fd = bpf_create_map(BPF_MAP_TYPE_PERCPU_ARRAY, sizeof(key),
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200353 sizeof(bpf_percpu(values, 0)), 2, 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200354 if (fd < 0) {
355 printf("Failed to create arraymap '%s'!\n", strerror(errno));
356 exit(1);
357 }
358
359 for (i = 0; i < nr_cpus; i++)
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200360 bpf_percpu(values, i) = i + 100;
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200361
362 key = 1;
363 /* Insert key=1 element. */
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100364 assert(bpf_map_update_elem(fd, &key, values, BPF_ANY) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200365
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200366 bpf_percpu(values, 0) = 0;
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100367 assert(bpf_map_update_elem(fd, &key, values, BPF_NOEXIST) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200368 errno == EEXIST);
369
370 /* Check that key=1 can be found. */
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200371 assert(bpf_map_lookup_elem(fd, &key, values) == 0 &&
372 bpf_percpu(values, 0) == 100);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200373
374 key = 0;
375 /* Check that key=0 is also found and zero initialized. */
Mickaël Salaüne5ff7c42017-02-10 00:21:40 +0100376 assert(bpf_map_lookup_elem(fd, &key, values) == 0 &&
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200377 bpf_percpu(values, 0) == 0 &&
378 bpf_percpu(values, nr_cpus - 1) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200379
380 /* Check that key=2 cannot be inserted due to max_entries limit. */
381 key = 2;
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100382 assert(bpf_map_update_elem(fd, &key, values, BPF_EXIST) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200383 errno == E2BIG);
384
385 /* Check that key = 2 doesn't exist. */
Mickaël Salaüne5ff7c42017-02-10 00:21:40 +0100386 assert(bpf_map_lookup_elem(fd, &key, values) == -1 && errno == ENOENT);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200387
388 /* Iterate over two elements. */
Teng Qin8fe45922017-04-24 19:00:37 -0700389 assert(bpf_map_get_next_key(fd, NULL, &next_key) == 0 &&
390 next_key == 0);
Mickaël Salaün5f155c22017-02-10 00:21:42 +0100391 assert(bpf_map_get_next_key(fd, &key, &next_key) == 0 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200392 next_key == 0);
Mickaël Salaün5f155c22017-02-10 00:21:42 +0100393 assert(bpf_map_get_next_key(fd, &next_key, &next_key) == 0 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200394 next_key == 1);
Mickaël Salaün5f155c22017-02-10 00:21:42 +0100395 assert(bpf_map_get_next_key(fd, &next_key, &next_key) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200396 errno == ENOENT);
397
398 /* Delete shouldn't succeed. */
399 key = 1;
Mickaël Salaüne58383b2017-02-10 00:21:41 +0100400 assert(bpf_map_delete_elem(fd, &key) == -1 && errno == EINVAL);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200401
402 close(fd);
403}
404
405static void test_arraymap_percpu_many_keys(void)
406{
Daniel Borkmanne00c7b22016-11-26 01:28:09 +0100407 unsigned int nr_cpus = bpf_num_possible_cpus();
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200408 BPF_DECLARE_PERCPU(long, values);
Alexei Starovoitov8c290e62017-03-21 19:05:04 -0700409 /* nr_keys is not too large otherwise the test stresses percpu
410 * allocator more than anything else
411 */
412 unsigned int nr_keys = 2000;
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200413 int key, fd, i;
414
Mickaël Salaünf4874d02017-02-10 00:21:43 +0100415 fd = bpf_create_map(BPF_MAP_TYPE_PERCPU_ARRAY, sizeof(key),
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200416 sizeof(bpf_percpu(values, 0)), nr_keys, 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200417 if (fd < 0) {
418 printf("Failed to create per-cpu arraymap '%s'!\n",
419 strerror(errno));
420 exit(1);
421 }
422
423 for (i = 0; i < nr_cpus; i++)
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200424 bpf_percpu(values, i) = i + 10;
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200425
426 for (key = 0; key < nr_keys; key++)
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100427 assert(bpf_map_update_elem(fd, &key, values, BPF_ANY) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200428
429 for (key = 0; key < nr_keys; key++) {
430 for (i = 0; i < nr_cpus; i++)
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200431 bpf_percpu(values, i) = 0;
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200432
Mickaël Salaüne5ff7c42017-02-10 00:21:40 +0100433 assert(bpf_map_lookup_elem(fd, &key, values) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200434
435 for (i = 0; i < nr_cpus; i++)
Daniel Borkmannf3515b52017-04-27 01:39:35 +0200436 assert(bpf_percpu(values, i) == i + 10);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200437 }
438
439 close(fd);
440}
441
John Fastabend546ac1f2017-07-17 09:28:56 -0700442static void test_devmap(int task, void *data)
443{
John Fastabend81f6bf82017-07-26 17:32:07 -0700444 int fd;
John Fastabend546ac1f2017-07-17 09:28:56 -0700445 __u32 key, value;
446
447 fd = bpf_create_map(BPF_MAP_TYPE_DEVMAP, sizeof(key), sizeof(value),
448 2, 0);
449 if (fd < 0) {
450 printf("Failed to create arraymap '%s'!\n", strerror(errno));
451 exit(1);
452 }
453
454 close(fd);
455}
456
John Fastabend6f6d33f2017-08-15 22:34:22 -0700457#include <sys/socket.h>
458#include <sys/ioctl.h>
459#include <arpa/inet.h>
460#include <sys/select.h>
461#include <linux/err.h>
462#define SOCKMAP_PARSE_PROG "./sockmap_parse_prog.o"
463#define SOCKMAP_VERDICT_PROG "./sockmap_verdict_prog.o"
John Fastabend3f0d6a12017-08-28 07:12:41 -0700464static void test_sockmap(int tasks, void *data)
John Fastabend6f6d33f2017-08-15 22:34:22 -0700465{
John Fastabend81374aa2017-08-28 07:11:43 -0700466 int one = 1, map_fd_rx, map_fd_tx, map_fd_break, s, sc, rc;
467 struct bpf_map *bpf_map_rx, *bpf_map_tx, *bpf_map_break;
John Fastabend6f6d33f2017-08-15 22:34:22 -0700468 int ports[] = {50200, 50201, 50202, 50204};
John Fastabend435bf0d2017-10-18 07:10:15 -0700469 int err, i, fd, udp, sfd[6] = {0xdeadbeef};
John Fastabend6fd28862017-08-28 07:11:05 -0700470 u8 buf[20] = {0x0, 0x5, 0x3, 0x2, 0x1, 0x0};
John Fastabend6f6d33f2017-08-15 22:34:22 -0700471 int parse_prog, verdict_prog;
John Fastabend6f6d33f2017-08-15 22:34:22 -0700472 struct sockaddr_in addr;
473 struct bpf_object *obj;
474 struct timeval to;
475 __u32 key, value;
John Fastabend3f0d6a12017-08-28 07:12:41 -0700476 pid_t pid[tasks];
John Fastabend6f6d33f2017-08-15 22:34:22 -0700477 fd_set w;
478
479 /* Create some sockets to use with sockmap */
480 for (i = 0; i < 2; i++) {
481 sfd[i] = socket(AF_INET, SOCK_STREAM, 0);
482 if (sfd[i] < 0)
483 goto out;
484 err = setsockopt(sfd[i], SOL_SOCKET, SO_REUSEADDR,
485 (char *)&one, sizeof(one));
486 if (err) {
487 printf("failed to setsockopt\n");
488 goto out;
489 }
490 err = ioctl(sfd[i], FIONBIO, (char *)&one);
491 if (err < 0) {
492 printf("failed to ioctl\n");
493 goto out;
494 }
495 memset(&addr, 0, sizeof(struct sockaddr_in));
496 addr.sin_family = AF_INET;
497 addr.sin_addr.s_addr = inet_addr("127.0.0.1");
498 addr.sin_port = htons(ports[i]);
499 err = bind(sfd[i], (struct sockaddr *)&addr, sizeof(addr));
500 if (err < 0) {
501 printf("failed to bind: err %i: %i:%i\n",
502 err, i, sfd[i]);
503 goto out;
504 }
505 err = listen(sfd[i], 32);
506 if (err < 0) {
Colin Ian King90774a92017-08-30 18:15:25 +0100507 printf("failed to listen\n");
John Fastabend6f6d33f2017-08-15 22:34:22 -0700508 goto out;
509 }
510 }
511
512 for (i = 2; i < 4; i++) {
513 sfd[i] = socket(AF_INET, SOCK_STREAM, 0);
514 if (sfd[i] < 0)
515 goto out;
516 err = setsockopt(sfd[i], SOL_SOCKET, SO_REUSEADDR,
517 (char *)&one, sizeof(one));
518 if (err) {
519 printf("set sock opt\n");
520 goto out;
521 }
522 memset(&addr, 0, sizeof(struct sockaddr_in));
523 addr.sin_family = AF_INET;
524 addr.sin_addr.s_addr = inet_addr("127.0.0.1");
525 addr.sin_port = htons(ports[i - 2]);
526 err = connect(sfd[i], (struct sockaddr *)&addr, sizeof(addr));
527 if (err) {
Colin Ian King90774a92017-08-30 18:15:25 +0100528 printf("failed to connect\n");
John Fastabend6f6d33f2017-08-15 22:34:22 -0700529 goto out;
530 }
531 }
532
533
534 for (i = 4; i < 6; i++) {
535 sfd[i] = accept(sfd[i - 4], NULL, NULL);
536 if (sfd[i] < 0) {
537 printf("accept failed\n");
538 goto out;
539 }
540 }
541
542 /* Test sockmap with connected sockets */
543 fd = bpf_create_map(BPF_MAP_TYPE_SOCKMAP,
544 sizeof(key), sizeof(value),
545 6, 0);
546 if (fd < 0) {
547 printf("Failed to create sockmap %i\n", fd);
548 goto out_sockmap;
549 }
550
John Fastabend435bf0d2017-10-18 07:10:15 -0700551 /* Test update with unsupported UDP socket */
552 udp = socket(AF_INET, SOCK_DGRAM, 0);
553 i = 0;
554 err = bpf_map_update_elem(fd, &i, &udp, BPF_ANY);
555 if (!err) {
556 printf("Failed socket SOCK_DGRAM allowed '%i:%i'\n",
557 i, udp);
558 goto out_sockmap;
559 }
560
John Fastabend464bc0f2017-08-28 07:10:04 -0700561 /* Test update without programs */
John Fastabend6f6d33f2017-08-15 22:34:22 -0700562 for (i = 0; i < 6; i++) {
563 err = bpf_map_update_elem(fd, &i, &sfd[i], BPF_ANY);
John Fastabend464bc0f2017-08-28 07:10:04 -0700564 if (err) {
565 printf("Failed noprog update sockmap '%i:%i'\n",
John Fastabend6f6d33f2017-08-15 22:34:22 -0700566 i, sfd[i]);
567 goto out_sockmap;
568 }
569 }
570
John Fastabend5a67da22017-09-08 14:00:49 -0700571 /* Test attaching/detaching bad fds */
John Fastabend464bc0f2017-08-28 07:10:04 -0700572 err = bpf_prog_attach(-1, fd, BPF_SK_SKB_STREAM_PARSER, 0);
John Fastabend6f6d33f2017-08-15 22:34:22 -0700573 if (!err) {
John Fastabend464bc0f2017-08-28 07:10:04 -0700574 printf("Failed invalid parser prog attach\n");
575 goto out_sockmap;
576 }
577
578 err = bpf_prog_attach(-1, fd, BPF_SK_SKB_STREAM_VERDICT, 0);
579 if (!err) {
580 printf("Failed invalid verdict prog attach\n");
John Fastabend6f6d33f2017-08-15 22:34:22 -0700581 goto out_sockmap;
582 }
583
John Fastabend5a67da22017-09-08 14:00:49 -0700584 err = bpf_prog_attach(-1, fd, __MAX_BPF_ATTACH_TYPE, 0);
585 if (!err) {
586 printf("Failed unknown prog attach\n");
587 goto out_sockmap;
588 }
589
590 err = bpf_prog_detach(fd, BPF_SK_SKB_STREAM_PARSER);
591 if (err) {
592 printf("Failed empty parser prog detach\n");
593 goto out_sockmap;
594 }
595
596 err = bpf_prog_detach(fd, BPF_SK_SKB_STREAM_VERDICT);
597 if (err) {
598 printf("Failed empty verdict prog detach\n");
599 goto out_sockmap;
600 }
601
602 err = bpf_prog_detach(fd, __MAX_BPF_ATTACH_TYPE);
603 if (!err) {
604 printf("Detach invalid prog successful\n");
605 goto out_sockmap;
606 }
607
John Fastabend6f6d33f2017-08-15 22:34:22 -0700608 /* Load SK_SKB program and Attach */
609 err = bpf_prog_load(SOCKMAP_PARSE_PROG,
610 BPF_PROG_TYPE_SK_SKB, &obj, &parse_prog);
611 if (err) {
612 printf("Failed to load SK_SKB parse prog\n");
613 goto out_sockmap;
614 }
615
616 err = bpf_prog_load(SOCKMAP_VERDICT_PROG,
617 BPF_PROG_TYPE_SK_SKB, &obj, &verdict_prog);
618 if (err) {
619 printf("Failed to load SK_SKB verdict prog\n");
620 goto out_sockmap;
621 }
622
John Fastabend6fd28862017-08-28 07:11:05 -0700623 bpf_map_rx = bpf_object__find_map_by_name(obj, "sock_map_rx");
624 if (IS_ERR(bpf_map_rx)) {
625 printf("Failed to load map rx from verdict prog\n");
John Fastabend6f6d33f2017-08-15 22:34:22 -0700626 goto out_sockmap;
627 }
628
John Fastabend6fd28862017-08-28 07:11:05 -0700629 map_fd_rx = bpf_map__fd(bpf_map_rx);
630 if (map_fd_rx < 0) {
John Fastabend6f6d33f2017-08-15 22:34:22 -0700631 printf("Failed to get map fd\n");
632 goto out_sockmap;
633 }
634
John Fastabend6fd28862017-08-28 07:11:05 -0700635 bpf_map_tx = bpf_object__find_map_by_name(obj, "sock_map_tx");
636 if (IS_ERR(bpf_map_tx)) {
637 printf("Failed to load map tx from verdict prog\n");
638 goto out_sockmap;
639 }
640
641 map_fd_tx = bpf_map__fd(bpf_map_tx);
642 if (map_fd_tx < 0) {
643 printf("Failed to get map tx fd\n");
644 goto out_sockmap;
645 }
646
John Fastabend81374aa2017-08-28 07:11:43 -0700647 bpf_map_break = bpf_object__find_map_by_name(obj, "sock_map_break");
648 if (IS_ERR(bpf_map_break)) {
649 printf("Failed to load map tx from verdict prog\n");
650 goto out_sockmap;
651 }
652
653 map_fd_break = bpf_map__fd(bpf_map_break);
654 if (map_fd_break < 0) {
655 printf("Failed to get map tx fd\n");
656 goto out_sockmap;
657 }
658
659 err = bpf_prog_attach(parse_prog, map_fd_break,
660 BPF_SK_SKB_STREAM_PARSER, 0);
661 if (!err) {
662 printf("Allowed attaching SK_SKB program to invalid map\n");
663 goto out_sockmap;
664 }
665
John Fastabend6fd28862017-08-28 07:11:05 -0700666 err = bpf_prog_attach(parse_prog, map_fd_rx,
John Fastabend464bc0f2017-08-28 07:10:04 -0700667 BPF_SK_SKB_STREAM_PARSER, 0);
John Fastabend6f6d33f2017-08-15 22:34:22 -0700668 if (err) {
John Fastabend81374aa2017-08-28 07:11:43 -0700669 printf("Failed stream parser bpf prog attach\n");
John Fastabend6f6d33f2017-08-15 22:34:22 -0700670 goto out_sockmap;
671 }
672
John Fastabend6fd28862017-08-28 07:11:05 -0700673 err = bpf_prog_attach(verdict_prog, map_fd_rx,
John Fastabend464bc0f2017-08-28 07:10:04 -0700674 BPF_SK_SKB_STREAM_VERDICT, 0);
675 if (err) {
John Fastabend81374aa2017-08-28 07:11:43 -0700676 printf("Failed stream verdict bpf prog attach\n");
John Fastabend464bc0f2017-08-28 07:10:04 -0700677 goto out_sockmap;
678 }
679
John Fastabend5a67da22017-09-08 14:00:49 -0700680 err = bpf_prog_attach(verdict_prog, map_fd_rx,
681 __MAX_BPF_ATTACH_TYPE, 0);
682 if (!err) {
683 printf("Attached unknown bpf prog\n");
684 goto out_sockmap;
685 }
686
John Fastabend464bc0f2017-08-28 07:10:04 -0700687 /* Test map update elem afterwards fd lives in fd and map_fd */
John Fastabend6f6d33f2017-08-15 22:34:22 -0700688 for (i = 0; i < 6; i++) {
John Fastabend6fd28862017-08-28 07:11:05 -0700689 err = bpf_map_update_elem(map_fd_rx, &i, &sfd[i], BPF_ANY);
John Fastabend6f6d33f2017-08-15 22:34:22 -0700690 if (err) {
John Fastabend6fd28862017-08-28 07:11:05 -0700691 printf("Failed map_fd_rx update sockmap %i '%i:%i'\n",
692 err, i, sfd[i]);
693 goto out_sockmap;
694 }
695 err = bpf_map_update_elem(map_fd_tx, &i, &sfd[i], BPF_ANY);
696 if (err) {
697 printf("Failed map_fd_tx update sockmap %i '%i:%i'\n",
John Fastabend6f6d33f2017-08-15 22:34:22 -0700698 err, i, sfd[i]);
699 goto out_sockmap;
700 }
701 }
702
703 /* Test map delete elem and remove send/recv sockets */
704 for (i = 2; i < 4; i++) {
John Fastabend6fd28862017-08-28 07:11:05 -0700705 err = bpf_map_delete_elem(map_fd_rx, &i);
John Fastabend6f6d33f2017-08-15 22:34:22 -0700706 if (err) {
John Fastabend6fd28862017-08-28 07:11:05 -0700707 printf("Failed delete sockmap rx %i '%i:%i'\n",
708 err, i, sfd[i]);
709 goto out_sockmap;
710 }
711 err = bpf_map_delete_elem(map_fd_tx, &i);
712 if (err) {
713 printf("Failed delete sockmap tx %i '%i:%i'\n",
John Fastabend6f6d33f2017-08-15 22:34:22 -0700714 err, i, sfd[i]);
715 goto out_sockmap;
716 }
717 }
718
719 /* Test map send/recv */
John Fastabend6fd28862017-08-28 07:11:05 -0700720 for (i = 0; i < 2; i++) {
721 buf[0] = i;
722 buf[1] = 0x5;
723 sc = send(sfd[2], buf, 20, 0);
724 if (sc < 0) {
725 printf("Failed sockmap send\n");
726 goto out_sockmap;
727 }
728
729 FD_ZERO(&w);
730 FD_SET(sfd[3], &w);
731 to.tv_sec = 1;
732 to.tv_usec = 0;
733 s = select(sfd[3] + 1, &w, NULL, NULL, &to);
734 if (s == -1) {
735 perror("Failed sockmap select()");
736 goto out_sockmap;
737 } else if (!s) {
738 printf("Failed sockmap unexpected timeout\n");
739 goto out_sockmap;
740 }
741
742 if (!FD_ISSET(sfd[3], &w)) {
743 printf("Failed sockmap select/recv\n");
744 goto out_sockmap;
745 }
746
747 rc = recv(sfd[3], buf, sizeof(buf), 0);
748 if (rc < 0) {
749 printf("Failed sockmap recv\n");
750 goto out_sockmap;
751 }
752 }
753
754 /* Negative null entry lookup from datapath should be dropped */
755 buf[0] = 1;
756 buf[1] = 12;
757 sc = send(sfd[2], buf, 20, 0);
John Fastabend6f6d33f2017-08-15 22:34:22 -0700758 if (sc < 0) {
759 printf("Failed sockmap send\n");
760 goto out_sockmap;
761 }
762
John Fastabend464bc0f2017-08-28 07:10:04 -0700763 /* Push fd into same slot */
John Fastabend6f6d33f2017-08-15 22:34:22 -0700764 i = 2;
765 err = bpf_map_update_elem(fd, &i, &sfd[i], BPF_NOEXIST);
766 if (!err) {
John Fastabend464bc0f2017-08-28 07:10:04 -0700767 printf("Failed allowed sockmap dup slot BPF_NOEXIST\n");
John Fastabend6f6d33f2017-08-15 22:34:22 -0700768 goto out_sockmap;
769 }
770
771 err = bpf_map_update_elem(fd, &i, &sfd[i], BPF_ANY);
772 if (err) {
John Fastabend464bc0f2017-08-28 07:10:04 -0700773 printf("Failed sockmap update new slot BPF_ANY\n");
John Fastabend6f6d33f2017-08-15 22:34:22 -0700774 goto out_sockmap;
775 }
776
777 err = bpf_map_update_elem(fd, &i, &sfd[i], BPF_EXIST);
778 if (err) {
John Fastabend464bc0f2017-08-28 07:10:04 -0700779 printf("Failed sockmap update new slot BPF_EXIST\n");
John Fastabend6f6d33f2017-08-15 22:34:22 -0700780 goto out_sockmap;
781 }
782
John Fastabend464bc0f2017-08-28 07:10:04 -0700783 /* Delete the elems without programs */
784 for (i = 0; i < 6; i++) {
785 err = bpf_map_delete_elem(fd, &i);
786 if (err) {
787 printf("Failed delete sockmap %i '%i:%i'\n",
788 err, i, sfd[i]);
789 }
790 }
791
792 /* Test having multiple maps open and set with programs on same fds */
793 err = bpf_prog_attach(parse_prog, fd,
794 BPF_SK_SKB_STREAM_PARSER, 0);
795 if (err) {
796 printf("Failed fd bpf parse prog attach\n");
797 goto out_sockmap;
798 }
799 err = bpf_prog_attach(verdict_prog, fd,
800 BPF_SK_SKB_STREAM_VERDICT, 0);
801 if (err) {
802 printf("Failed fd bpf verdict prog attach\n");
John Fastabend6f6d33f2017-08-15 22:34:22 -0700803 goto out_sockmap;
804 }
805
John Fastabend464bc0f2017-08-28 07:10:04 -0700806 for (i = 4; i < 6; i++) {
807 err = bpf_map_update_elem(fd, &i, &sfd[i], BPF_ANY);
808 if (!err) {
809 printf("Failed allowed duplicate programs in update ANY sockmap %i '%i:%i'\n",
810 err, i, sfd[i]);
811 goto out_sockmap;
812 }
813 err = bpf_map_update_elem(fd, &i, &sfd[i], BPF_NOEXIST);
814 if (!err) {
815 printf("Failed allowed duplicate program in update NOEXIST sockmap %i '%i:%i'\n",
816 err, i, sfd[i]);
817 goto out_sockmap;
818 }
819 err = bpf_map_update_elem(fd, &i, &sfd[i], BPF_EXIST);
820 if (!err) {
821 printf("Failed allowed duplicate program in update EXIST sockmap %i '%i:%i'\n",
822 err, i, sfd[i]);
823 goto out_sockmap;
824 }
John Fastabend6f6d33f2017-08-15 22:34:22 -0700825 }
826
John Fastabend3f0d6a12017-08-28 07:12:41 -0700827 /* Test tasks number of forked operations */
828 for (i = 0; i < tasks; i++) {
829 pid[i] = fork();
830 if (pid[i] == 0) {
831 for (i = 0; i < 6; i++) {
832 bpf_map_delete_elem(map_fd_tx, &i);
833 bpf_map_delete_elem(map_fd_rx, &i);
834 bpf_map_update_elem(map_fd_tx, &i,
835 &sfd[i], BPF_ANY);
836 bpf_map_update_elem(map_fd_rx, &i,
837 &sfd[i], BPF_ANY);
838 }
839 exit(0);
840 } else if (pid[i] == -1) {
841 printf("Couldn't spawn #%d process!\n", i);
842 exit(1);
843 }
844 }
845
846 for (i = 0; i < tasks; i++) {
847 int status;
848
849 assert(waitpid(pid[i], &status, 0) == pid[i]);
850 assert(status == 0);
851 }
852
John Fastabend5a67da22017-09-08 14:00:49 -0700853 err = bpf_prog_detach(map_fd_rx, __MAX_BPF_ATTACH_TYPE);
854 if (!err) {
855 printf("Detached an invalid prog type.\n");
856 goto out_sockmap;
857 }
858
859 err = bpf_prog_detach(map_fd_rx, BPF_SK_SKB_STREAM_PARSER);
860 if (err) {
861 printf("Failed parser prog detach\n");
862 goto out_sockmap;
863 }
864
865 err = bpf_prog_detach(map_fd_rx, BPF_SK_SKB_STREAM_VERDICT);
866 if (err) {
867 printf("Failed parser prog detach\n");
868 goto out_sockmap;
869 }
870
John Fastabend6f6d33f2017-08-15 22:34:22 -0700871 /* Test map close sockets */
872 for (i = 0; i < 6; i++)
873 close(sfd[i]);
874 close(fd);
John Fastabend6fd28862017-08-28 07:11:05 -0700875 close(map_fd_rx);
John Fastabend6f6d33f2017-08-15 22:34:22 -0700876 bpf_object__close(obj);
877 return;
878out:
879 for (i = 0; i < 6; i++)
880 close(sfd[i]);
881 printf("Failed to create sockmap '%i:%s'!\n", i, strerror(errno));
882 exit(1);
883out_sockmap:
884 for (i = 0; i < 6; i++)
885 close(sfd[i]);
886 close(fd);
887 exit(1);
888}
889
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200890#define MAP_SIZE (32 * 1024)
891
892static void test_map_large(void)
893{
894 struct bigkey {
895 int a;
896 char b[116];
897 long long c;
898 } key;
899 int fd, i, value;
900
Mickaël Salaünf4874d02017-02-10 00:21:43 +0100901 fd = bpf_create_map(BPF_MAP_TYPE_HASH, sizeof(key), sizeof(value),
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200902 MAP_SIZE, map_flags);
903 if (fd < 0) {
904 printf("Failed to create large map '%s'!\n", strerror(errno));
905 exit(1);
906 }
907
908 for (i = 0; i < MAP_SIZE; i++) {
909 key = (struct bigkey) { .c = i };
910 value = i;
911
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100912 assert(bpf_map_update_elem(fd, &key, &value, BPF_NOEXIST) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200913 }
914
915 key.c = -1;
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100916 assert(bpf_map_update_elem(fd, &key, &value, BPF_NOEXIST) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200917 errno == E2BIG);
918
919 /* Iterate through all elements. */
Teng Qin8fe45922017-04-24 19:00:37 -0700920 assert(bpf_map_get_next_key(fd, NULL, &key) == 0);
921 key.c = -1;
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200922 for (i = 0; i < MAP_SIZE; i++)
Mickaël Salaün5f155c22017-02-10 00:21:42 +0100923 assert(bpf_map_get_next_key(fd, &key, &key) == 0);
924 assert(bpf_map_get_next_key(fd, &key, &key) == -1 && errno == ENOENT);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200925
926 key.c = 0;
Mickaël Salaüne5ff7c42017-02-10 00:21:40 +0100927 assert(bpf_map_lookup_elem(fd, &key, &value) == 0 && value == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200928 key.a = 1;
Mickaël Salaüne5ff7c42017-02-10 00:21:40 +0100929 assert(bpf_map_lookup_elem(fd, &key, &value) == -1 && errno == ENOENT);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200930
931 close(fd);
932}
933
934static void run_parallel(int tasks, void (*fn)(int task, void *data),
935 void *data)
936{
937 pid_t pid[tasks];
938 int i;
939
940 for (i = 0; i < tasks; i++) {
941 pid[i] = fork();
942 if (pid[i] == 0) {
943 fn(i, data);
944 exit(0);
945 } else if (pid[i] == -1) {
946 printf("Couldn't spawn #%d process!\n", i);
947 exit(1);
948 }
949 }
950
951 for (i = 0; i < tasks; i++) {
952 int status;
953
954 assert(waitpid(pid[i], &status, 0) == pid[i]);
955 assert(status == 0);
956 }
957}
958
959static void test_map_stress(void)
960{
961 run_parallel(100, test_hashmap, NULL);
962 run_parallel(100, test_hashmap_percpu, NULL);
Alexei Starovoitov8c290e62017-03-21 19:05:04 -0700963 run_parallel(100, test_hashmap_sizes, NULL);
Daniel Borkmann5ecf51f2017-06-11 00:50:44 +0200964 run_parallel(100, test_hashmap_walk, NULL);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200965
966 run_parallel(100, test_arraymap, NULL);
967 run_parallel(100, test_arraymap_percpu, NULL);
968}
969
970#define TASKS 1024
971
972#define DO_UPDATE 1
973#define DO_DELETE 0
974
975static void do_work(int fn, void *data)
976{
977 int do_update = ((int *)data)[1];
978 int fd = ((int *)data)[0];
979 int i, key, value;
980
981 for (i = fn; i < MAP_SIZE; i += TASKS) {
982 key = value = i;
983
984 if (do_update) {
Mickaël Salaün10ecc722017-02-10 00:21:39 +0100985 assert(bpf_map_update_elem(fd, &key, &value,
986 BPF_NOEXIST) == 0);
987 assert(bpf_map_update_elem(fd, &key, &value,
988 BPF_EXIST) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200989 } else {
Mickaël Salaüne58383b2017-02-10 00:21:41 +0100990 assert(bpf_map_delete_elem(fd, &key) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +0200991 }
992 }
993}
994
995static void test_map_parallel(void)
996{
997 int i, fd, key = 0, value = 0;
998 int data[2];
999
Mickaël Salaünf4874d02017-02-10 00:21:43 +01001000 fd = bpf_create_map(BPF_MAP_TYPE_HASH, sizeof(key), sizeof(value),
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +02001001 MAP_SIZE, map_flags);
1002 if (fd < 0) {
1003 printf("Failed to create map for parallel test '%s'!\n",
1004 strerror(errno));
1005 exit(1);
1006 }
1007
1008 /* Use the same fd in children to add elements to this map:
1009 * child_0 adds key=0, key=1024, key=2048, ...
1010 * child_1 adds key=1, key=1025, key=2049, ...
1011 * child_1023 adds key=1023, ...
1012 */
1013 data[0] = fd;
1014 data[1] = DO_UPDATE;
1015 run_parallel(TASKS, do_work, data);
1016
1017 /* Check that key=0 is already there. */
Mickaël Salaün10ecc722017-02-10 00:21:39 +01001018 assert(bpf_map_update_elem(fd, &key, &value, BPF_NOEXIST) == -1 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +02001019 errno == EEXIST);
1020
1021 /* Check that all elements were inserted. */
Teng Qin8fe45922017-04-24 19:00:37 -07001022 assert(bpf_map_get_next_key(fd, NULL, &key) == 0);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +02001023 key = -1;
1024 for (i = 0; i < MAP_SIZE; i++)
Mickaël Salaün5f155c22017-02-10 00:21:42 +01001025 assert(bpf_map_get_next_key(fd, &key, &key) == 0);
1026 assert(bpf_map_get_next_key(fd, &key, &key) == -1 && errno == ENOENT);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +02001027
1028 /* Another check for all elements */
1029 for (i = 0; i < MAP_SIZE; i++) {
1030 key = MAP_SIZE - i - 1;
1031
Mickaël Salaüne5ff7c42017-02-10 00:21:40 +01001032 assert(bpf_map_lookup_elem(fd, &key, &value) == 0 &&
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +02001033 value == key);
1034 }
1035
1036 /* Now let's delete all elemenets in parallel. */
1037 data[1] = DO_DELETE;
1038 run_parallel(TASKS, do_work, data);
1039
1040 /* Nothing should be left. */
1041 key = -1;
Teng Qin8fe45922017-04-24 19:00:37 -07001042 assert(bpf_map_get_next_key(fd, NULL, &key) == -1 && errno == ENOENT);
Mickaël Salaün5f155c22017-02-10 00:21:42 +01001043 assert(bpf_map_get_next_key(fd, &key, &key) == -1 && errno == ENOENT);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +02001044}
1045
Chenbo Fenge0433252017-10-18 13:00:23 -07001046static void test_map_rdonly(void)
1047{
Alexei Starovoitove27afb82017-10-22 10:29:06 -07001048 int fd, key = 0, value = 0;
Chenbo Fenge0433252017-10-18 13:00:23 -07001049
1050 fd = bpf_create_map(BPF_MAP_TYPE_HASH, sizeof(key), sizeof(value),
1051 MAP_SIZE, map_flags | BPF_F_RDONLY);
1052 if (fd < 0) {
1053 printf("Failed to create map for read only test '%s'!\n",
1054 strerror(errno));
1055 exit(1);
1056 }
1057
1058 key = 1;
1059 value = 1234;
1060 /* Insert key=1 element. */
1061 assert(bpf_map_update_elem(fd, &key, &value, BPF_ANY) == -1 &&
1062 errno == EPERM);
1063
1064 /* Check that key=2 is not found. */
1065 assert(bpf_map_lookup_elem(fd, &key, &value) == -1 && errno == ENOENT);
1066 assert(bpf_map_get_next_key(fd, &key, &value) == -1 && errno == ENOENT);
1067}
1068
1069static void test_map_wronly(void)
1070{
Alexei Starovoitove27afb82017-10-22 10:29:06 -07001071 int fd, key = 0, value = 0;
Chenbo Fenge0433252017-10-18 13:00:23 -07001072
1073 fd = bpf_create_map(BPF_MAP_TYPE_HASH, sizeof(key), sizeof(value),
1074 MAP_SIZE, map_flags | BPF_F_WRONLY);
1075 if (fd < 0) {
1076 printf("Failed to create map for read only test '%s'!\n",
1077 strerror(errno));
1078 exit(1);
1079 }
1080
1081 key = 1;
1082 value = 1234;
1083 /* Insert key=1 element. */
Alexei Starovoitove27afb82017-10-22 10:29:06 -07001084 assert(bpf_map_update_elem(fd, &key, &value, BPF_ANY) == 0);
Chenbo Fenge0433252017-10-18 13:00:23 -07001085
1086 /* Check that key=2 is not found. */
1087 assert(bpf_map_lookup_elem(fd, &key, &value) == -1 && errno == EPERM);
1088 assert(bpf_map_get_next_key(fd, &key, &value) == -1 && errno == EPERM);
1089}
1090
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +02001091static void run_all_tests(void)
1092{
1093 test_hashmap(0, NULL);
1094 test_hashmap_percpu(0, NULL);
Daniel Borkmann5ecf51f2017-06-11 00:50:44 +02001095 test_hashmap_walk(0, NULL);
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +02001096
1097 test_arraymap(0, NULL);
1098 test_arraymap_percpu(0, NULL);
1099
1100 test_arraymap_percpu_many_keys();
1101
John Fastabend81f6bf82017-07-26 17:32:07 -07001102 test_devmap(0, NULL);
John Fastabend6f6d33f2017-08-15 22:34:22 -07001103 test_sockmap(0, NULL);
John Fastabend81f6bf82017-07-26 17:32:07 -07001104
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +02001105 test_map_large();
1106 test_map_parallel();
1107 test_map_stress();
Chenbo Fenge0433252017-10-18 13:00:23 -07001108
1109 test_map_rdonly();
1110 test_map_wronly();
Daniel Borkmann5aa5bd12016-10-17 14:28:36 +02001111}
1112
1113int main(void)
1114{
1115 struct rlimit rinf = { RLIM_INFINITY, RLIM_INFINITY };
1116
1117 setrlimit(RLIMIT_MEMLOCK, &rinf);
1118
1119 map_flags = 0;
1120 run_all_tests();
1121
1122 map_flags = BPF_F_NO_PREALLOC;
1123 run_all_tests();
1124
1125 printf("test_maps: OK\n");
1126 return 0;
1127}