forked from mirrors/linux
		
	 c5ffb26375
			
		
	
	
		c5ffb26375
		
	
	
	
	
		
			
			This commit enhances the syscall tracing programs by using the BPF_SYSCALL macro to reduce the inconvenience of parsing arguments from pt_regs. By simplifying argument extraction, bpf program will become clear to understand. Signed-off-by: Daniel T. Lee <danieltimlee@gmail.com> Signed-off-by: Andrii Nakryiko <andrii@kernel.org> Link: https://lore.kernel.org/bpf/20221224071527.2292-6-danieltimlee@gmail.com
		
			
				
	
	
		
			297 lines
		
	
	
	
		
			6.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			297 lines
		
	
	
	
		
			6.4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /* Copyright (c) 2016 Facebook
 | |
|  *
 | |
|  * This program is free software; you can redistribute it and/or
 | |
|  * modify it under the terms of version 2 of the GNU General Public
 | |
|  * License as published by the Free Software Foundation.
 | |
|  */
 | |
| #include "vmlinux.h"
 | |
| #include <errno.h>
 | |
| #include <linux/version.h>
 | |
| #include <bpf/bpf_helpers.h>
 | |
| #include <bpf/bpf_tracing.h>
 | |
| #include <bpf/bpf_core_read.h>
 | |
| 
 | |
| #define MAX_ENTRIES 1000
 | |
| #define MAX_NR_CPUS 1024
 | |
| 
 | |
| struct {
 | |
| 	__uint(type, BPF_MAP_TYPE_HASH);
 | |
| 	__type(key, u32);
 | |
| 	__type(value, long);
 | |
| 	__uint(max_entries, MAX_ENTRIES);
 | |
| } hash_map SEC(".maps");
 | |
| 
 | |
| struct {
 | |
| 	__uint(type, BPF_MAP_TYPE_LRU_HASH);
 | |
| 	__type(key, u32);
 | |
| 	__type(value, long);
 | |
| 	__uint(max_entries, 10000);
 | |
| } lru_hash_map SEC(".maps");
 | |
| 
 | |
| struct {
 | |
| 	__uint(type, BPF_MAP_TYPE_LRU_HASH);
 | |
| 	__type(key, u32);
 | |
| 	__type(value, long);
 | |
| 	__uint(max_entries, 10000);
 | |
| 	__uint(map_flags, BPF_F_NO_COMMON_LRU);
 | |
| } nocommon_lru_hash_map SEC(".maps");
 | |
| 
 | |
| struct inner_lru {
 | |
| 	__uint(type, BPF_MAP_TYPE_LRU_HASH);
 | |
| 	__type(key, u32);
 | |
| 	__type(value, long);
 | |
| 	__uint(max_entries, MAX_ENTRIES);
 | |
| 	__uint(map_flags, BPF_F_NUMA_NODE);
 | |
| 	__uint(numa_node, 0);
 | |
| } inner_lru_hash_map SEC(".maps");
 | |
| 
 | |
| struct {
 | |
| 	__uint(type, BPF_MAP_TYPE_ARRAY_OF_MAPS);
 | |
| 	__uint(max_entries, MAX_NR_CPUS);
 | |
| 	__uint(key_size, sizeof(u32));
 | |
| 	__array(values, struct inner_lru); /* use inner_lru as inner map */
 | |
| } array_of_lru_hashs SEC(".maps") = {
 | |
| 	/* statically initialize the first element */
 | |
| 	.values = { &inner_lru_hash_map },
 | |
| };
 | |
| 
 | |
| struct {
 | |
| 	__uint(type, BPF_MAP_TYPE_PERCPU_HASH);
 | |
| 	__uint(key_size, sizeof(u32));
 | |
| 	__uint(value_size, sizeof(long));
 | |
| 	__uint(max_entries, MAX_ENTRIES);
 | |
| } percpu_hash_map SEC(".maps");
 | |
| 
 | |
| struct {
 | |
| 	__uint(type, BPF_MAP_TYPE_HASH);
 | |
| 	__type(key, u32);
 | |
| 	__type(value, long);
 | |
| 	__uint(max_entries, MAX_ENTRIES);
 | |
| 	__uint(map_flags, BPF_F_NO_PREALLOC);
 | |
| } hash_map_alloc SEC(".maps");
 | |
| 
 | |
| struct {
 | |
| 	__uint(type, BPF_MAP_TYPE_PERCPU_HASH);
 | |
| 	__uint(key_size, sizeof(u32));
 | |
| 	__uint(value_size, sizeof(long));
 | |
| 	__uint(max_entries, MAX_ENTRIES);
 | |
| 	__uint(map_flags, BPF_F_NO_PREALLOC);
 | |
| } percpu_hash_map_alloc SEC(".maps");
 | |
| 
 | |
| struct {
 | |
| 	__uint(type, BPF_MAP_TYPE_LPM_TRIE);
 | |
| 	__uint(key_size, 8);
 | |
| 	__uint(value_size, sizeof(long));
 | |
| 	__uint(max_entries, 10000);
 | |
| 	__uint(map_flags, BPF_F_NO_PREALLOC);
 | |
| } lpm_trie_map_alloc SEC(".maps");
 | |
| 
 | |
| struct {
 | |
| 	__uint(type, BPF_MAP_TYPE_ARRAY);
 | |
| 	__type(key, u32);
 | |
| 	__type(value, long);
 | |
| 	__uint(max_entries, MAX_ENTRIES);
 | |
| } array_map SEC(".maps");
 | |
| 
 | |
| struct {
 | |
| 	__uint(type, BPF_MAP_TYPE_LRU_HASH);
 | |
| 	__type(key, u32);
 | |
| 	__type(value, long);
 | |
| 	__uint(max_entries, MAX_ENTRIES);
 | |
| } lru_hash_lookup_map SEC(".maps");
 | |
| 
 | |
| SEC("ksyscall/getuid")
 | |
| int BPF_KSYSCALL(stress_hmap)
 | |
| {
 | |
| 	u32 key = bpf_get_current_pid_tgid();
 | |
| 	long init_val = 1;
 | |
| 	long *value;
 | |
| 	int i;
 | |
| 
 | |
| 	for (i = 0; i < 10; i++) {
 | |
| 		bpf_map_update_elem(&hash_map, &key, &init_val, BPF_ANY);
 | |
| 		value = bpf_map_lookup_elem(&hash_map, &key);
 | |
| 		if (value)
 | |
| 			bpf_map_delete_elem(&hash_map, &key);
 | |
| 	}
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| SEC("ksyscall/geteuid")
 | |
| int BPF_KSYSCALL(stress_percpu_hmap)
 | |
| {
 | |
| 	u32 key = bpf_get_current_pid_tgid();
 | |
| 	long init_val = 1;
 | |
| 	long *value;
 | |
| 	int i;
 | |
| 
 | |
| 	for (i = 0; i < 10; i++) {
 | |
| 		bpf_map_update_elem(&percpu_hash_map, &key, &init_val, BPF_ANY);
 | |
| 		value = bpf_map_lookup_elem(&percpu_hash_map, &key);
 | |
| 		if (value)
 | |
| 			bpf_map_delete_elem(&percpu_hash_map, &key);
 | |
| 	}
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| SEC("ksyscall/getgid")
 | |
| int BPF_KSYSCALL(stress_hmap_alloc)
 | |
| {
 | |
| 	u32 key = bpf_get_current_pid_tgid();
 | |
| 	long init_val = 1;
 | |
| 	long *value;
 | |
| 	int i;
 | |
| 
 | |
| 	for (i = 0; i < 10; i++) {
 | |
| 		bpf_map_update_elem(&hash_map_alloc, &key, &init_val, BPF_ANY);
 | |
| 		value = bpf_map_lookup_elem(&hash_map_alloc, &key);
 | |
| 		if (value)
 | |
| 			bpf_map_delete_elem(&hash_map_alloc, &key);
 | |
| 	}
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| SEC("ksyscall/getegid")
 | |
| int BPF_KSYSCALL(stress_percpu_hmap_alloc)
 | |
| {
 | |
| 	u32 key = bpf_get_current_pid_tgid();
 | |
| 	long init_val = 1;
 | |
| 	long *value;
 | |
| 	int i;
 | |
| 
 | |
| 	for (i = 0; i < 10; i++) {
 | |
| 		bpf_map_update_elem(&percpu_hash_map_alloc, &key, &init_val, BPF_ANY);
 | |
| 		value = bpf_map_lookup_elem(&percpu_hash_map_alloc, &key);
 | |
| 		if (value)
 | |
| 			bpf_map_delete_elem(&percpu_hash_map_alloc, &key);
 | |
| 	}
 | |
| 	return 0;
 | |
| }
 | |
| SEC("ksyscall/connect")
 | |
| int BPF_KSYSCALL(stress_lru_hmap_alloc, int fd, struct sockaddr_in *uservaddr,
 | |
| 		 int addrlen)
 | |
| {
 | |
| 	char fmt[] = "Failed at stress_lru_hmap_alloc. ret:%dn";
 | |
| 	union {
 | |
| 		u16 dst6[8];
 | |
| 		struct {
 | |
| 			u16 magic0;
 | |
| 			u16 magic1;
 | |
| 			u16 tcase;
 | |
| 			u16 unused16;
 | |
| 			u32 unused32;
 | |
| 			u32 key;
 | |
| 		};
 | |
| 	} test_params;
 | |
| 	struct sockaddr_in6 *in6 = (struct sockaddr_in6 *)uservaddr;
 | |
| 	u16 test_case;
 | |
| 	long val = 1;
 | |
| 	u32 key = 0;
 | |
| 	int ret;
 | |
| 
 | |
| 	if (addrlen != sizeof(*in6))
 | |
| 		return 0;
 | |
| 
 | |
| 	ret = bpf_probe_read_user(test_params.dst6, sizeof(test_params.dst6),
 | |
| 				  &in6->sin6_addr);
 | |
| 	if (ret)
 | |
| 		goto done;
 | |
| 
 | |
| 	if (test_params.magic0 != 0xdead ||
 | |
| 	    test_params.magic1 != 0xbeef)
 | |
| 		return 0;
 | |
| 
 | |
| 	test_case = test_params.tcase;
 | |
| 	if (test_case != 3)
 | |
| 		key = bpf_get_prandom_u32();
 | |
| 
 | |
| 	if (test_case == 0) {
 | |
| 		ret = bpf_map_update_elem(&lru_hash_map, &key, &val, BPF_ANY);
 | |
| 	} else if (test_case == 1) {
 | |
| 		ret = bpf_map_update_elem(&nocommon_lru_hash_map, &key, &val,
 | |
| 					  BPF_ANY);
 | |
| 	} else if (test_case == 2) {
 | |
| 		void *nolocal_lru_map;
 | |
| 		int cpu = bpf_get_smp_processor_id();
 | |
| 
 | |
| 		nolocal_lru_map = bpf_map_lookup_elem(&array_of_lru_hashs,
 | |
| 						      &cpu);
 | |
| 		if (!nolocal_lru_map) {
 | |
| 			ret = -ENOENT;
 | |
| 			goto done;
 | |
| 		}
 | |
| 
 | |
| 		ret = bpf_map_update_elem(nolocal_lru_map, &key, &val,
 | |
| 					  BPF_ANY);
 | |
| 	} else if (test_case == 3) {
 | |
| 		u32 i;
 | |
| 
 | |
| 		key = test_params.key;
 | |
| 
 | |
| #pragma clang loop unroll(full)
 | |
| 		for (i = 0; i < 32; i++) {
 | |
| 			bpf_map_lookup_elem(&lru_hash_lookup_map, &key);
 | |
| 			key++;
 | |
| 		}
 | |
| 	} else {
 | |
| 		ret = -EINVAL;
 | |
| 	}
 | |
| 
 | |
| done:
 | |
| 	if (ret)
 | |
| 		bpf_trace_printk(fmt, sizeof(fmt), ret);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| SEC("ksyscall/gettid")
 | |
| int BPF_KSYSCALL(stress_lpm_trie_map_alloc)
 | |
| {
 | |
| 	union {
 | |
| 		u32 b32[2];
 | |
| 		u8 b8[8];
 | |
| 	} key;
 | |
| 	unsigned int i;
 | |
| 
 | |
| 	key.b32[0] = 32;
 | |
| 	key.b8[4] = 192;
 | |
| 	key.b8[5] = 168;
 | |
| 	key.b8[6] = 0;
 | |
| 	key.b8[7] = 1;
 | |
| 
 | |
| #pragma clang loop unroll(full)
 | |
| 	for (i = 0; i < 32; ++i)
 | |
| 		bpf_map_lookup_elem(&lpm_trie_map_alloc, &key);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| SEC("ksyscall/getpgid")
 | |
| int BPF_KSYSCALL(stress_hash_map_lookup)
 | |
| {
 | |
| 	u32 key = 1, i;
 | |
| 	long *value;
 | |
| 
 | |
| #pragma clang loop unroll(full)
 | |
| 	for (i = 0; i < 64; ++i)
 | |
| 		value = bpf_map_lookup_elem(&hash_map, &key);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| SEC("ksyscall/getppid")
 | |
| int BPF_KSYSCALL(stress_array_map_lookup)
 | |
| {
 | |
| 	u32 key = 1, i;
 | |
| 	long *value;
 | |
| 
 | |
| #pragma clang loop unroll(full)
 | |
| 	for (i = 0; i < 64; ++i)
 | |
| 		value = bpf_map_lookup_elem(&array_map, &key);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| char _license[] SEC("license") = "GPL";
 | |
| u32 _version SEC("version") = LINUX_VERSION_CODE;
 |