149c299b6SDenis Salopek // SPDX-License-Identifier: GPL-2.0-only
249c299b6SDenis Salopek 
349c299b6SDenis Salopek #include <test_progs.h>
449c299b6SDenis Salopek #include "test_lookup_and_delete.skel.h"
549c299b6SDenis Salopek 
649c299b6SDenis Salopek #define START_VALUE 1234
749c299b6SDenis Salopek #define NEW_VALUE 4321
849c299b6SDenis Salopek #define MAX_ENTRIES 2
949c299b6SDenis Salopek 
1049c299b6SDenis Salopek static int duration;
1149c299b6SDenis Salopek static int nr_cpus;
1249c299b6SDenis Salopek 
fill_values(int map_fd)1349c299b6SDenis Salopek static int fill_values(int map_fd)
1449c299b6SDenis Salopek {
1549c299b6SDenis Salopek 	__u64 key, value = START_VALUE;
1649c299b6SDenis Salopek 	int err;
1749c299b6SDenis Salopek 
1849c299b6SDenis Salopek 	for (key = 1; key < MAX_ENTRIES + 1; key++) {
1949c299b6SDenis Salopek 		err = bpf_map_update_elem(map_fd, &key, &value, BPF_NOEXIST);
2049c299b6SDenis Salopek 		if (!ASSERT_OK(err, "bpf_map_update_elem"))
2149c299b6SDenis Salopek 			return -1;
2249c299b6SDenis Salopek 	}
2349c299b6SDenis Salopek 
2449c299b6SDenis Salopek 	return 0;
2549c299b6SDenis Salopek }
2649c299b6SDenis Salopek 
fill_values_percpu(int map_fd)2749c299b6SDenis Salopek static int fill_values_percpu(int map_fd)
2849c299b6SDenis Salopek {
2949c299b6SDenis Salopek 	__u64 key, value[nr_cpus];
3049c299b6SDenis Salopek 	int i, err;
3149c299b6SDenis Salopek 
3249c299b6SDenis Salopek 	for (i = 0; i < nr_cpus; i++)
3349c299b6SDenis Salopek 		value[i] = START_VALUE;
3449c299b6SDenis Salopek 
3549c299b6SDenis Salopek 	for (key = 1; key < MAX_ENTRIES + 1; key++) {
3649c299b6SDenis Salopek 		err = bpf_map_update_elem(map_fd, &key, value, BPF_NOEXIST);
3749c299b6SDenis Salopek 		if (!ASSERT_OK(err, "bpf_map_update_elem"))
3849c299b6SDenis Salopek 			return -1;
3949c299b6SDenis Salopek 	}
4049c299b6SDenis Salopek 
4149c299b6SDenis Salopek 	return 0;
4249c299b6SDenis Salopek }
4349c299b6SDenis Salopek 
setup_prog(enum bpf_map_type map_type,int * map_fd)4449c299b6SDenis Salopek static struct test_lookup_and_delete *setup_prog(enum bpf_map_type map_type,
4549c299b6SDenis Salopek 						 int *map_fd)
4649c299b6SDenis Salopek {
4749c299b6SDenis Salopek 	struct test_lookup_and_delete *skel;
4849c299b6SDenis Salopek 	int err;
4949c299b6SDenis Salopek 
5049c299b6SDenis Salopek 	skel = test_lookup_and_delete__open();
5149c299b6SDenis Salopek 	if (!ASSERT_OK_PTR(skel, "test_lookup_and_delete__open"))
5249c299b6SDenis Salopek 		return NULL;
5349c299b6SDenis Salopek 
5449c299b6SDenis Salopek 	err = bpf_map__set_type(skel->maps.hash_map, map_type);
5549c299b6SDenis Salopek 	if (!ASSERT_OK(err, "bpf_map__set_type"))
5649c299b6SDenis Salopek 		goto cleanup;
5749c299b6SDenis Salopek 
5849c299b6SDenis Salopek 	err = bpf_map__set_max_entries(skel->maps.hash_map, MAX_ENTRIES);
5949c299b6SDenis Salopek 	if (!ASSERT_OK(err, "bpf_map__set_max_entries"))
6049c299b6SDenis Salopek 		goto cleanup;
6149c299b6SDenis Salopek 
6249c299b6SDenis Salopek 	err = test_lookup_and_delete__load(skel);
6349c299b6SDenis Salopek 	if (!ASSERT_OK(err, "test_lookup_and_delete__load"))
6449c299b6SDenis Salopek 		goto cleanup;
6549c299b6SDenis Salopek 
6649c299b6SDenis Salopek 	*map_fd = bpf_map__fd(skel->maps.hash_map);
6749c299b6SDenis Salopek 	if (!ASSERT_GE(*map_fd, 0, "bpf_map__fd"))
6849c299b6SDenis Salopek 		goto cleanup;
6949c299b6SDenis Salopek 
7049c299b6SDenis Salopek 	return skel;
7149c299b6SDenis Salopek 
7249c299b6SDenis Salopek cleanup:
7349c299b6SDenis Salopek 	test_lookup_and_delete__destroy(skel);
7449c299b6SDenis Salopek 	return NULL;
7549c299b6SDenis Salopek }
7649c299b6SDenis Salopek 
7749c299b6SDenis Salopek /* Triggers BPF program that updates map with given key and value */
trigger_tp(struct test_lookup_and_delete * skel,__u64 key,__u64 value)7849c299b6SDenis Salopek static int trigger_tp(struct test_lookup_and_delete *skel, __u64 key,
7949c299b6SDenis Salopek 		      __u64 value)
8049c299b6SDenis Salopek {
8149c299b6SDenis Salopek 	int err;
8249c299b6SDenis Salopek 
8349c299b6SDenis Salopek 	skel->bss->set_pid = getpid();
8449c299b6SDenis Salopek 	skel->bss->set_key = key;
8549c299b6SDenis Salopek 	skel->bss->set_value = value;
8649c299b6SDenis Salopek 
8749c299b6SDenis Salopek 	err = test_lookup_and_delete__attach(skel);
8849c299b6SDenis Salopek 	if (!ASSERT_OK(err, "test_lookup_and_delete__attach"))
8949c299b6SDenis Salopek 		return -1;
9049c299b6SDenis Salopek 
9149c299b6SDenis Salopek 	syscall(__NR_getpgid);
9249c299b6SDenis Salopek 
9349c299b6SDenis Salopek 	test_lookup_and_delete__detach(skel);
9449c299b6SDenis Salopek 
9549c299b6SDenis Salopek 	return 0;
9649c299b6SDenis Salopek }
9749c299b6SDenis Salopek 
test_lookup_and_delete_hash(void)9849c299b6SDenis Salopek static void test_lookup_and_delete_hash(void)
9949c299b6SDenis Salopek {
10049c299b6SDenis Salopek 	struct test_lookup_and_delete *skel;
10149c299b6SDenis Salopek 	__u64 key, value;
10249c299b6SDenis Salopek 	int map_fd, err;
10349c299b6SDenis Salopek 
10449c299b6SDenis Salopek 	/* Setup program and fill the map. */
10549c299b6SDenis Salopek 	skel = setup_prog(BPF_MAP_TYPE_HASH, &map_fd);
10649c299b6SDenis Salopek 	if (!ASSERT_OK_PTR(skel, "setup_prog"))
10749c299b6SDenis Salopek 		return;
10849c299b6SDenis Salopek 
10949c299b6SDenis Salopek 	err = fill_values(map_fd);
11049c299b6SDenis Salopek 	if (!ASSERT_OK(err, "fill_values"))
11149c299b6SDenis Salopek 		goto cleanup;
11249c299b6SDenis Salopek 
11349c299b6SDenis Salopek 	/* Lookup and delete element. */
11449c299b6SDenis Salopek 	key = 1;
115*b2531d4bSAndrii Nakryiko 	err = bpf_map__lookup_and_delete_elem(skel->maps.hash_map,
116*b2531d4bSAndrii Nakryiko 					      &key, sizeof(key), &value, sizeof(value), 0);
11749c299b6SDenis Salopek 	if (!ASSERT_OK(err, "bpf_map_lookup_and_delete_elem"))
11849c299b6SDenis Salopek 		goto cleanup;
11949c299b6SDenis Salopek 
12049c299b6SDenis Salopek 	/* Fetched value should match the initially set value. */
12149c299b6SDenis Salopek 	if (CHECK(value != START_VALUE, "bpf_map_lookup_and_delete_elem",
12249c299b6SDenis Salopek 		  "unexpected value=%lld\n", value))
12349c299b6SDenis Salopek 		goto cleanup;
12449c299b6SDenis Salopek 
12549c299b6SDenis Salopek 	/* Check that the entry is non existent. */
12649c299b6SDenis Salopek 	err = bpf_map_lookup_elem(map_fd, &key, &value);
12749c299b6SDenis Salopek 	if (!ASSERT_ERR(err, "bpf_map_lookup_elem"))
12849c299b6SDenis Salopek 		goto cleanup;
12949c299b6SDenis Salopek 
13049c299b6SDenis Salopek cleanup:
13149c299b6SDenis Salopek 	test_lookup_and_delete__destroy(skel);
13249c299b6SDenis Salopek }
13349c299b6SDenis Salopek 
test_lookup_and_delete_percpu_hash(void)13449c299b6SDenis Salopek static void test_lookup_and_delete_percpu_hash(void)
13549c299b6SDenis Salopek {
13649c299b6SDenis Salopek 	struct test_lookup_and_delete *skel;
13749c299b6SDenis Salopek 	__u64 key, val, value[nr_cpus];
13849c299b6SDenis Salopek 	int map_fd, err, i;
13949c299b6SDenis Salopek 
14049c299b6SDenis Salopek 	/* Setup program and fill the map. */
14149c299b6SDenis Salopek 	skel = setup_prog(BPF_MAP_TYPE_PERCPU_HASH, &map_fd);
14249c299b6SDenis Salopek 	if (!ASSERT_OK_PTR(skel, "setup_prog"))
14349c299b6SDenis Salopek 		return;
14449c299b6SDenis Salopek 
14549c299b6SDenis Salopek 	err = fill_values_percpu(map_fd);
14649c299b6SDenis Salopek 	if (!ASSERT_OK(err, "fill_values_percpu"))
14749c299b6SDenis Salopek 		goto cleanup;
14849c299b6SDenis Salopek 
14949c299b6SDenis Salopek 	/* Lookup and delete element. */
15049c299b6SDenis Salopek 	key = 1;
151*b2531d4bSAndrii Nakryiko 	err = bpf_map__lookup_and_delete_elem(skel->maps.hash_map,
152*b2531d4bSAndrii Nakryiko 					      &key, sizeof(key), value, sizeof(value), 0);
15349c299b6SDenis Salopek 	if (!ASSERT_OK(err, "bpf_map_lookup_and_delete_elem"))
15449c299b6SDenis Salopek 		goto cleanup;
15549c299b6SDenis Salopek 
15649c299b6SDenis Salopek 	for (i = 0; i < nr_cpus; i++) {
15749c299b6SDenis Salopek 		val = value[i];
15849c299b6SDenis Salopek 
15949c299b6SDenis Salopek 		/* Fetched value should match the initially set value. */
16049c299b6SDenis Salopek 		if (CHECK(val != START_VALUE, "map value",
16149c299b6SDenis Salopek 			  "unexpected for cpu %d: %lld\n", i, val))
16249c299b6SDenis Salopek 			goto cleanup;
16349c299b6SDenis Salopek 	}
16449c299b6SDenis Salopek 
16549c299b6SDenis Salopek 	/* Check that the entry is non existent. */
16649c299b6SDenis Salopek 	err = bpf_map_lookup_elem(map_fd, &key, value);
16749c299b6SDenis Salopek 	if (!ASSERT_ERR(err, "bpf_map_lookup_elem"))
16849c299b6SDenis Salopek 		goto cleanup;
16949c299b6SDenis Salopek 
17049c299b6SDenis Salopek cleanup:
17149c299b6SDenis Salopek 	test_lookup_and_delete__destroy(skel);
17249c299b6SDenis Salopek }
17349c299b6SDenis Salopek 
test_lookup_and_delete_lru_hash(void)17449c299b6SDenis Salopek static void test_lookup_and_delete_lru_hash(void)
17549c299b6SDenis Salopek {
17649c299b6SDenis Salopek 	struct test_lookup_and_delete *skel;
17749c299b6SDenis Salopek 	__u64 key, value;
17849c299b6SDenis Salopek 	int map_fd, err;
17949c299b6SDenis Salopek 
18049c299b6SDenis Salopek 	/* Setup program and fill the LRU map. */
18149c299b6SDenis Salopek 	skel = setup_prog(BPF_MAP_TYPE_LRU_HASH, &map_fd);
18249c299b6SDenis Salopek 	if (!ASSERT_OK_PTR(skel, "setup_prog"))
18349c299b6SDenis Salopek 		return;
18449c299b6SDenis Salopek 
18549c299b6SDenis Salopek 	err = fill_values(map_fd);
18649c299b6SDenis Salopek 	if (!ASSERT_OK(err, "fill_values"))
18749c299b6SDenis Salopek 		goto cleanup;
18849c299b6SDenis Salopek 
18949c299b6SDenis Salopek 	/* Insert new element at key=3, should reuse LRU element. */
19049c299b6SDenis Salopek 	key = 3;
19149c299b6SDenis Salopek 	err = trigger_tp(skel, key, NEW_VALUE);
19249c299b6SDenis Salopek 	if (!ASSERT_OK(err, "trigger_tp"))
19349c299b6SDenis Salopek 		goto cleanup;
19449c299b6SDenis Salopek 
19549c299b6SDenis Salopek 	/* Lookup and delete element 3. */
196*b2531d4bSAndrii Nakryiko 	err = bpf_map__lookup_and_delete_elem(skel->maps.hash_map,
197*b2531d4bSAndrii Nakryiko 					      &key, sizeof(key), &value, sizeof(value), 0);
19849c299b6SDenis Salopek 	if (!ASSERT_OK(err, "bpf_map_lookup_and_delete_elem"))
19949c299b6SDenis Salopek 		goto cleanup;
20049c299b6SDenis Salopek 
20149c299b6SDenis Salopek 	/* Value should match the new value. */
20249c299b6SDenis Salopek 	if (CHECK(value != NEW_VALUE, "bpf_map_lookup_and_delete_elem",
20349c299b6SDenis Salopek 		  "unexpected value=%lld\n", value))
20449c299b6SDenis Salopek 		goto cleanup;
20549c299b6SDenis Salopek 
20649c299b6SDenis Salopek 	/* Check that entries 3 and 1 are non existent. */
20749c299b6SDenis Salopek 	err = bpf_map_lookup_elem(map_fd, &key, &value);
20849c299b6SDenis Salopek 	if (!ASSERT_ERR(err, "bpf_map_lookup_elem"))
20949c299b6SDenis Salopek 		goto cleanup;
21049c299b6SDenis Salopek 
21149c299b6SDenis Salopek 	key = 1;
21249c299b6SDenis Salopek 	err = bpf_map_lookup_elem(map_fd, &key, &value);
21349c299b6SDenis Salopek 	if (!ASSERT_ERR(err, "bpf_map_lookup_elem"))
21449c299b6SDenis Salopek 		goto cleanup;
21549c299b6SDenis Salopek 
21649c299b6SDenis Salopek cleanup:
21749c299b6SDenis Salopek 	test_lookup_and_delete__destroy(skel);
21849c299b6SDenis Salopek }
21949c299b6SDenis Salopek 
test_lookup_and_delete_lru_percpu_hash(void)22049c299b6SDenis Salopek static void test_lookup_and_delete_lru_percpu_hash(void)
22149c299b6SDenis Salopek {
22249c299b6SDenis Salopek 	struct test_lookup_and_delete *skel;
22349c299b6SDenis Salopek 	__u64 key, val, value[nr_cpus];
22449c299b6SDenis Salopek 	int map_fd, err, i, cpucnt = 0;
22549c299b6SDenis Salopek 
22649c299b6SDenis Salopek 	/* Setup program and fill the LRU map. */
22749c299b6SDenis Salopek 	skel = setup_prog(BPF_MAP_TYPE_LRU_PERCPU_HASH, &map_fd);
22849c299b6SDenis Salopek 	if (!ASSERT_OK_PTR(skel, "setup_prog"))
22949c299b6SDenis Salopek 		return;
23049c299b6SDenis Salopek 
23149c299b6SDenis Salopek 	err = fill_values_percpu(map_fd);
23249c299b6SDenis Salopek 	if (!ASSERT_OK(err, "fill_values_percpu"))
23349c299b6SDenis Salopek 		goto cleanup;
23449c299b6SDenis Salopek 
23549c299b6SDenis Salopek 	/* Insert new element at key=3, should reuse LRU element 1. */
23649c299b6SDenis Salopek 	key = 3;
23749c299b6SDenis Salopek 	err = trigger_tp(skel, key, NEW_VALUE);
23849c299b6SDenis Salopek 	if (!ASSERT_OK(err, "trigger_tp"))
23949c299b6SDenis Salopek 		goto cleanup;
24049c299b6SDenis Salopek 
24149c299b6SDenis Salopek 	/* Clean value. */
24249c299b6SDenis Salopek 	for (i = 0; i < nr_cpus; i++)
24349c299b6SDenis Salopek 		value[i] = 0;
24449c299b6SDenis Salopek 
24549c299b6SDenis Salopek 	/* Lookup and delete element 3. */
246*b2531d4bSAndrii Nakryiko 	err = bpf_map__lookup_and_delete_elem(skel->maps.hash_map,
247*b2531d4bSAndrii Nakryiko 					      &key, sizeof(key), value, sizeof(value), 0);
248*b2531d4bSAndrii Nakryiko 	if (!ASSERT_OK(err, "bpf_map_lookup_and_delete_elem"))
24949c299b6SDenis Salopek 		goto cleanup;
25049c299b6SDenis Salopek 
25149c299b6SDenis Salopek 	/* Check if only one CPU has set the value. */
25249c299b6SDenis Salopek 	for (i = 0; i < nr_cpus; i++) {
25349c299b6SDenis Salopek 		val = value[i];
25449c299b6SDenis Salopek 		if (val) {
25549c299b6SDenis Salopek 			if (CHECK(val != NEW_VALUE, "map value",
25649c299b6SDenis Salopek 				  "unexpected for cpu %d: %lld\n", i, val))
25749c299b6SDenis Salopek 				goto cleanup;
25849c299b6SDenis Salopek 			cpucnt++;
25949c299b6SDenis Salopek 		}
26049c299b6SDenis Salopek 	}
26149c299b6SDenis Salopek 	if (CHECK(cpucnt != 1, "map value", "set for %d CPUs instead of 1!\n",
26249c299b6SDenis Salopek 		  cpucnt))
26349c299b6SDenis Salopek 		goto cleanup;
26449c299b6SDenis Salopek 
26549c299b6SDenis Salopek 	/* Check that entries 3 and 1 are non existent. */
26649c299b6SDenis Salopek 	err = bpf_map_lookup_elem(map_fd, &key, &value);
26749c299b6SDenis Salopek 	if (!ASSERT_ERR(err, "bpf_map_lookup_elem"))
26849c299b6SDenis Salopek 		goto cleanup;
26949c299b6SDenis Salopek 
27049c299b6SDenis Salopek 	key = 1;
27149c299b6SDenis Salopek 	err = bpf_map_lookup_elem(map_fd, &key, &value);
27249c299b6SDenis Salopek 	if (!ASSERT_ERR(err, "bpf_map_lookup_elem"))
27349c299b6SDenis Salopek 		goto cleanup;
27449c299b6SDenis Salopek 
27549c299b6SDenis Salopek cleanup:
27649c299b6SDenis Salopek 	test_lookup_and_delete__destroy(skel);
27749c299b6SDenis Salopek }
27849c299b6SDenis Salopek 
test_lookup_and_delete(void)27949c299b6SDenis Salopek void test_lookup_and_delete(void)
28049c299b6SDenis Salopek {
28149c299b6SDenis Salopek 	nr_cpus = bpf_num_possible_cpus();
28249c299b6SDenis Salopek 
28349c299b6SDenis Salopek 	if (test__start_subtest("lookup_and_delete"))
28449c299b6SDenis Salopek 		test_lookup_and_delete_hash();
28549c299b6SDenis Salopek 	if (test__start_subtest("lookup_and_delete_percpu"))
28649c299b6SDenis Salopek 		test_lookup_and_delete_percpu_hash();
28749c299b6SDenis Salopek 	if (test__start_subtest("lookup_and_delete_lru"))
28849c299b6SDenis Salopek 		test_lookup_and_delete_lru_hash();
28949c299b6SDenis Salopek 	if (test__start_subtest("lookup_and_delete_lru_percpu"))
29049c299b6SDenis Salopek 		test_lookup_and_delete_lru_percpu_hash();
29149c299b6SDenis Salopek }
292