|  | /* Copyright (c) 2016 Facebook | 
|  | * | 
|  | * This program is free software; you can redistribute it and/or | 
|  | * modify it under the terms of version 2 of the GNU General Public | 
|  | * License as published by the Free Software Foundation. | 
|  | */ | 
|  | #include "vmlinux.h" | 
|  | #include <errno.h> | 
|  | #include <linux/version.h> | 
|  | #include <bpf/bpf_helpers.h> | 
|  | #include <bpf/bpf_tracing.h> | 
|  | #include <bpf/bpf_core_read.h> | 
|  |  | 
|  | #define MAX_ENTRIES 1000 | 
|  | #define MAX_NR_CPUS 1024 | 
|  |  | 
|  | struct { | 
|  | __uint(type, BPF_MAP_TYPE_HASH); | 
|  | __type(key, u32); | 
|  | __type(value, long); | 
|  | __uint(max_entries, MAX_ENTRIES); | 
|  | } hash_map SEC(".maps"); | 
|  |  | 
|  | struct { | 
|  | __uint(type, BPF_MAP_TYPE_LRU_HASH); | 
|  | __type(key, u32); | 
|  | __type(value, long); | 
|  | __uint(max_entries, 10000); | 
|  | } lru_hash_map SEC(".maps"); | 
|  |  | 
|  | struct { | 
|  | __uint(type, BPF_MAP_TYPE_LRU_HASH); | 
|  | __type(key, u32); | 
|  | __type(value, long); | 
|  | __uint(max_entries, 10000); | 
|  | __uint(map_flags, BPF_F_NO_COMMON_LRU); | 
|  | } nocommon_lru_hash_map SEC(".maps"); | 
|  |  | 
|  | struct inner_lru { | 
|  | __uint(type, BPF_MAP_TYPE_LRU_HASH); | 
|  | __type(key, u32); | 
|  | __type(value, long); | 
|  | __uint(max_entries, MAX_ENTRIES); | 
|  | __uint(map_flags, BPF_F_NUMA_NODE); | 
|  | __uint(numa_node, 0); | 
|  | } inner_lru_hash_map SEC(".maps"); | 
|  |  | 
|  | struct { | 
|  | __uint(type, BPF_MAP_TYPE_ARRAY_OF_MAPS); | 
|  | __uint(max_entries, MAX_NR_CPUS); | 
|  | __uint(key_size, sizeof(u32)); | 
|  | __array(values, struct inner_lru); /* use inner_lru as inner map */ | 
|  | } array_of_lru_hashs SEC(".maps") = { | 
|  | /* statically initialize the first element */ | 
|  | .values = { &inner_lru_hash_map }, | 
|  | }; | 
|  |  | 
|  | struct { | 
|  | __uint(type, BPF_MAP_TYPE_PERCPU_HASH); | 
|  | __uint(key_size, sizeof(u32)); | 
|  | __uint(value_size, sizeof(long)); | 
|  | __uint(max_entries, MAX_ENTRIES); | 
|  | } percpu_hash_map SEC(".maps"); | 
|  |  | 
|  | struct { | 
|  | __uint(type, BPF_MAP_TYPE_HASH); | 
|  | __type(key, u32); | 
|  | __type(value, long); | 
|  | __uint(max_entries, MAX_ENTRIES); | 
|  | __uint(map_flags, BPF_F_NO_PREALLOC); | 
|  | } hash_map_alloc SEC(".maps"); | 
|  |  | 
|  | struct { | 
|  | __uint(type, BPF_MAP_TYPE_PERCPU_HASH); | 
|  | __uint(key_size, sizeof(u32)); | 
|  | __uint(value_size, sizeof(long)); | 
|  | __uint(max_entries, MAX_ENTRIES); | 
|  | __uint(map_flags, BPF_F_NO_PREALLOC); | 
|  | } percpu_hash_map_alloc SEC(".maps"); | 
|  |  | 
|  | struct { | 
|  | __uint(type, BPF_MAP_TYPE_LPM_TRIE); | 
|  | __uint(key_size, 8); | 
|  | __uint(value_size, sizeof(long)); | 
|  | __uint(max_entries, 10000); | 
|  | __uint(map_flags, BPF_F_NO_PREALLOC); | 
|  | } lpm_trie_map_alloc SEC(".maps"); | 
|  |  | 
|  | struct { | 
|  | __uint(type, BPF_MAP_TYPE_ARRAY); | 
|  | __type(key, u32); | 
|  | __type(value, long); | 
|  | __uint(max_entries, MAX_ENTRIES); | 
|  | } array_map SEC(".maps"); | 
|  |  | 
|  | struct { | 
|  | __uint(type, BPF_MAP_TYPE_LRU_HASH); | 
|  | __type(key, u32); | 
|  | __type(value, long); | 
|  | __uint(max_entries, MAX_ENTRIES); | 
|  | } lru_hash_lookup_map SEC(".maps"); | 
|  |  | 
|  | SEC("ksyscall/getuid") | 
|  | int BPF_KSYSCALL(stress_hmap) | 
|  | { | 
|  | u32 key = bpf_get_current_pid_tgid(); | 
|  | long init_val = 1; | 
|  | long *value; | 
|  | int i; | 
|  |  | 
|  | for (i = 0; i < 10; i++) { | 
|  | bpf_map_update_elem(&hash_map, &key, &init_val, BPF_ANY); | 
|  | value = bpf_map_lookup_elem(&hash_map, &key); | 
|  | if (value) | 
|  | bpf_map_delete_elem(&hash_map, &key); | 
|  | } | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | SEC("ksyscall/geteuid") | 
|  | int BPF_KSYSCALL(stress_percpu_hmap) | 
|  | { | 
|  | u32 key = bpf_get_current_pid_tgid(); | 
|  | long init_val = 1; | 
|  | long *value; | 
|  | int i; | 
|  |  | 
|  | for (i = 0; i < 10; i++) { | 
|  | bpf_map_update_elem(&percpu_hash_map, &key, &init_val, BPF_ANY); | 
|  | value = bpf_map_lookup_elem(&percpu_hash_map, &key); | 
|  | if (value) | 
|  | bpf_map_delete_elem(&percpu_hash_map, &key); | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | SEC("ksyscall/getgid") | 
|  | int BPF_KSYSCALL(stress_hmap_alloc) | 
|  | { | 
|  | u32 key = bpf_get_current_pid_tgid(); | 
|  | long init_val = 1; | 
|  | long *value; | 
|  | int i; | 
|  |  | 
|  | for (i = 0; i < 10; i++) { | 
|  | bpf_map_update_elem(&hash_map_alloc, &key, &init_val, BPF_ANY); | 
|  | value = bpf_map_lookup_elem(&hash_map_alloc, &key); | 
|  | if (value) | 
|  | bpf_map_delete_elem(&hash_map_alloc, &key); | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | SEC("ksyscall/getegid") | 
|  | int BPF_KSYSCALL(stress_percpu_hmap_alloc) | 
|  | { | 
|  | u32 key = bpf_get_current_pid_tgid(); | 
|  | long init_val = 1; | 
|  | long *value; | 
|  | int i; | 
|  |  | 
|  | for (i = 0; i < 10; i++) { | 
|  | bpf_map_update_elem(&percpu_hash_map_alloc, &key, &init_val, BPF_ANY); | 
|  | value = bpf_map_lookup_elem(&percpu_hash_map_alloc, &key); | 
|  | if (value) | 
|  | bpf_map_delete_elem(&percpu_hash_map_alloc, &key); | 
|  | } | 
|  | return 0; | 
|  | } | 
|  | SEC("ksyscall/connect") | 
|  | int BPF_KSYSCALL(stress_lru_hmap_alloc, int fd, struct sockaddr_in *uservaddr, | 
|  | int addrlen) | 
|  | { | 
|  | char fmt[] = "Failed at stress_lru_hmap_alloc. ret:%dn"; | 
|  | union { | 
|  | u16 dst6[8]; | 
|  | struct { | 
|  | u16 magic0; | 
|  | u16 magic1; | 
|  | u16 tcase; | 
|  | u16 unused16; | 
|  | u32 unused32; | 
|  | u32 key; | 
|  | }; | 
|  | } test_params; | 
|  | struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)uservaddr; | 
|  | u16 test_case; | 
|  | long val = 1; | 
|  | u32 key = 0; | 
|  | int ret; | 
|  |  | 
|  | if (addrlen != sizeof(*in6)) | 
|  | return 0; | 
|  |  | 
|  | ret = bpf_probe_read_user(test_params.dst6, sizeof(test_params.dst6), | 
|  | &in6->sin6_addr); | 
|  | if (ret) | 
|  | goto done; | 
|  |  | 
|  | if (test_params.magic0 != 0xdead || | 
|  | test_params.magic1 != 0xbeef) | 
|  | return 0; | 
|  |  | 
|  | test_case = test_params.tcase; | 
|  | if (test_case != 3) | 
|  | key = bpf_get_prandom_u32(); | 
|  |  | 
|  | if (test_case == 0) { | 
|  | ret = bpf_map_update_elem(&lru_hash_map, &key, &val, BPF_ANY); | 
|  | } else if (test_case == 1) { | 
|  | ret = bpf_map_update_elem(&nocommon_lru_hash_map, &key, &val, | 
|  | BPF_ANY); | 
|  | } else if (test_case == 2) { | 
|  | void *nolocal_lru_map; | 
|  | int cpu = bpf_get_smp_processor_id(); | 
|  |  | 
|  | nolocal_lru_map = bpf_map_lookup_elem(&array_of_lru_hashs, | 
|  | &cpu); | 
|  | if (!nolocal_lru_map) { | 
|  | ret = -ENOENT; | 
|  | goto done; | 
|  | } | 
|  |  | 
|  | ret = bpf_map_update_elem(nolocal_lru_map, &key, &val, | 
|  | BPF_ANY); | 
|  | } else if (test_case == 3) { | 
|  | u32 i; | 
|  |  | 
|  | key = test_params.key; | 
|  |  | 
|  | #pragma clang loop unroll(full) | 
|  | for (i = 0; i < 32; i++) { | 
|  | bpf_map_lookup_elem(&lru_hash_lookup_map, &key); | 
|  | key++; | 
|  | } | 
|  | } else { | 
|  | ret = -EINVAL; | 
|  | } | 
|  |  | 
|  | done: | 
|  | if (ret) | 
|  | bpf_trace_printk(fmt, sizeof(fmt), ret); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | SEC("ksyscall/gettid") | 
|  | int BPF_KSYSCALL(stress_lpm_trie_map_alloc) | 
|  | { | 
|  | union { | 
|  | u32 b32[2]; | 
|  | u8 b8[8]; | 
|  | } key; | 
|  | unsigned int i; | 
|  |  | 
|  | key.b32[0] = 32; | 
|  | key.b8[4] = 192; | 
|  | key.b8[5] = 168; | 
|  | key.b8[6] = 0; | 
|  | key.b8[7] = 1; | 
|  |  | 
|  | #pragma clang loop unroll(full) | 
|  | for (i = 0; i < 32; ++i) | 
|  | bpf_map_lookup_elem(&lpm_trie_map_alloc, &key); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | SEC("ksyscall/getpgid") | 
|  | int BPF_KSYSCALL(stress_hash_map_lookup) | 
|  | { | 
|  | u32 key = 1, i; | 
|  | long *value; | 
|  |  | 
|  | #pragma clang loop unroll(full) | 
|  | for (i = 0; i < 64; ++i) | 
|  | value = bpf_map_lookup_elem(&hash_map, &key); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | SEC("ksyscall/getppid") | 
|  | int BPF_KSYSCALL(stress_array_map_lookup) | 
|  | { | 
|  | u32 key = 1, i; | 
|  | long *value; | 
|  |  | 
|  | #pragma clang loop unroll(full) | 
|  | for (i = 0; i < 64; ++i) | 
|  | value = bpf_map_lookup_elem(&array_map, &key); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | char _license[] SEC("license") = "GPL"; | 
|  | u32 _version SEC("version") = LINUX_VERSION_CODE; |