157fd1c63SJoanne Koong // SPDX-License-Identifier: GPL-2.0
257fd1c63SJoanne Koong /* Copyright (c) 2021 Facebook */
357fd1c63SJoanne Koong 
457fd1c63SJoanne Koong #include <errno.h>
557fd1c63SJoanne Koong #include <linux/bpf.h>
657fd1c63SJoanne Koong #include <stdbool.h>
757fd1c63SJoanne Koong #include <bpf/bpf_helpers.h>
8*e91d280cSNaveen N. Rao #include "bpf_misc.h"
957fd1c63SJoanne Koong 
1057fd1c63SJoanne Koong char _license[] SEC("license") = "GPL";
1157fd1c63SJoanne Koong 
1257fd1c63SJoanne Koong struct bpf_map;
1357fd1c63SJoanne Koong 
1457fd1c63SJoanne Koong __u8 rand_vals[2500000];
1557fd1c63SJoanne Koong const __u32 nr_rand_bytes = 2500000;
1657fd1c63SJoanne Koong 
1757fd1c63SJoanne Koong struct {
1857fd1c63SJoanne Koong 	__uint(type, BPF_MAP_TYPE_ARRAY);
1957fd1c63SJoanne Koong 	__uint(key_size, sizeof(__u32));
2057fd1c63SJoanne Koong 	/* max entries and value_size will be set programmatically.
2157fd1c63SJoanne Koong 	 * They are configurable from the userspace bench program.
2257fd1c63SJoanne Koong 	 */
2357fd1c63SJoanne Koong } array_map SEC(".maps");
2457fd1c63SJoanne Koong 
2557fd1c63SJoanne Koong struct {
2657fd1c63SJoanne Koong 	__uint(type, BPF_MAP_TYPE_BLOOM_FILTER);
2757fd1c63SJoanne Koong 	/* max entries,  value_size, and # of hash functions will be set
2857fd1c63SJoanne Koong 	 * programmatically. They are configurable from the userspace
2957fd1c63SJoanne Koong 	 * bench program.
3057fd1c63SJoanne Koong 	 */
3157fd1c63SJoanne Koong 	__uint(map_extra, 3);
3257fd1c63SJoanne Koong } bloom_map SEC(".maps");
3357fd1c63SJoanne Koong 
3457fd1c63SJoanne Koong struct {
3557fd1c63SJoanne Koong 	__uint(type, BPF_MAP_TYPE_HASH);
3657fd1c63SJoanne Koong 	/* max entries, key_size, and value_size, will be set
3757fd1c63SJoanne Koong 	 * programmatically. They are configurable from the userspace
3857fd1c63SJoanne Koong 	 * bench program.
3957fd1c63SJoanne Koong 	 */
4057fd1c63SJoanne Koong } hashmap SEC(".maps");
4157fd1c63SJoanne Koong 
4257fd1c63SJoanne Koong struct callback_ctx {
4357fd1c63SJoanne Koong 	struct bpf_map *map;
4457fd1c63SJoanne Koong 	bool update;
4557fd1c63SJoanne Koong };
4657fd1c63SJoanne Koong 
4757fd1c63SJoanne Koong /* Tracks the number of hits, drops, and false hits */
4857fd1c63SJoanne Koong struct {
4957fd1c63SJoanne Koong 	__u32 stats[3];
5057fd1c63SJoanne Koong } __attribute__((__aligned__(256))) percpu_stats[256];
5157fd1c63SJoanne Koong 
5257fd1c63SJoanne Koong const __u32 hit_key  = 0;
5357fd1c63SJoanne Koong const __u32 drop_key  = 1;
5457fd1c63SJoanne Koong const __u32 false_hit_key = 2;
5557fd1c63SJoanne Koong 
5657fd1c63SJoanne Koong __u8 value_size;
5757fd1c63SJoanne Koong 
5857fd1c63SJoanne Koong const volatile bool hashmap_use_bloom;
5957fd1c63SJoanne Koong const volatile bool count_false_hits;
6057fd1c63SJoanne Koong 
6157fd1c63SJoanne Koong int error = 0;
6257fd1c63SJoanne Koong 
log_result(__u32 key)6357fd1c63SJoanne Koong static __always_inline void log_result(__u32 key)
6457fd1c63SJoanne Koong {
6557fd1c63SJoanne Koong 	__u32 cpu = bpf_get_smp_processor_id();
6657fd1c63SJoanne Koong 
6757fd1c63SJoanne Koong 	percpu_stats[cpu & 255].stats[key]++;
6857fd1c63SJoanne Koong }
6957fd1c63SJoanne Koong 
7057fd1c63SJoanne Koong static __u64
bloom_callback(struct bpf_map * map,__u32 * key,void * val,struct callback_ctx * data)7157fd1c63SJoanne Koong bloom_callback(struct bpf_map *map, __u32 *key, void *val,
7257fd1c63SJoanne Koong 	       struct callback_ctx *data)
7357fd1c63SJoanne Koong {
7457fd1c63SJoanne Koong 	int err;
7557fd1c63SJoanne Koong 
7657fd1c63SJoanne Koong 	if (data->update)
7757fd1c63SJoanne Koong 		err = bpf_map_push_elem(data->map, val, 0);
7857fd1c63SJoanne Koong 	else
7957fd1c63SJoanne Koong 		err = bpf_map_peek_elem(data->map, val);
8057fd1c63SJoanne Koong 
8157fd1c63SJoanne Koong 	if (err) {
8257fd1c63SJoanne Koong 		error |= 1;
8357fd1c63SJoanne Koong 		return 1; /* stop the iteration */
8457fd1c63SJoanne Koong 	}
8557fd1c63SJoanne Koong 
8657fd1c63SJoanne Koong 	log_result(hit_key);
8757fd1c63SJoanne Koong 
8857fd1c63SJoanne Koong 	return 0;
8957fd1c63SJoanne Koong }
9057fd1c63SJoanne Koong 
91*e91d280cSNaveen N. Rao SEC("fentry/" SYS_PREFIX "sys_getpgid")
bloom_lookup(void * ctx)9257fd1c63SJoanne Koong int bloom_lookup(void *ctx)
9357fd1c63SJoanne Koong {
9457fd1c63SJoanne Koong 	struct callback_ctx data;
9557fd1c63SJoanne Koong 
9657fd1c63SJoanne Koong 	data.map = (struct bpf_map *)&bloom_map;
9757fd1c63SJoanne Koong 	data.update = false;
9857fd1c63SJoanne Koong 
9957fd1c63SJoanne Koong 	bpf_for_each_map_elem(&array_map, bloom_callback, &data, 0);
10057fd1c63SJoanne Koong 
10157fd1c63SJoanne Koong 	return 0;
10257fd1c63SJoanne Koong }
10357fd1c63SJoanne Koong 
104*e91d280cSNaveen N. Rao SEC("fentry/" SYS_PREFIX "sys_getpgid")
bloom_update(void * ctx)10557fd1c63SJoanne Koong int bloom_update(void *ctx)
10657fd1c63SJoanne Koong {
10757fd1c63SJoanne Koong 	struct callback_ctx data;
10857fd1c63SJoanne Koong 
10957fd1c63SJoanne Koong 	data.map = (struct bpf_map *)&bloom_map;
11057fd1c63SJoanne Koong 	data.update = true;
11157fd1c63SJoanne Koong 
11257fd1c63SJoanne Koong 	bpf_for_each_map_elem(&array_map, bloom_callback, &data, 0);
11357fd1c63SJoanne Koong 
11457fd1c63SJoanne Koong 	return 0;
11557fd1c63SJoanne Koong }
11657fd1c63SJoanne Koong 
117*e91d280cSNaveen N. Rao SEC("fentry/" SYS_PREFIX "sys_getpgid")
bloom_hashmap_lookup(void * ctx)11857fd1c63SJoanne Koong int bloom_hashmap_lookup(void *ctx)
11957fd1c63SJoanne Koong {
12057fd1c63SJoanne Koong 	__u64 *result;
12157fd1c63SJoanne Koong 	int i, err;
12257fd1c63SJoanne Koong 
12357fd1c63SJoanne Koong 	__u32 index = bpf_get_prandom_u32();
12457fd1c63SJoanne Koong 	__u32 bitmask = (1ULL << 21) - 1;
12557fd1c63SJoanne Koong 
12657fd1c63SJoanne Koong 	for (i = 0; i < 1024; i++, index += value_size) {
12757fd1c63SJoanne Koong 		index = index & bitmask;
12857fd1c63SJoanne Koong 
12957fd1c63SJoanne Koong 		if (hashmap_use_bloom) {
13057fd1c63SJoanne Koong 			err = bpf_map_peek_elem(&bloom_map,
13157fd1c63SJoanne Koong 						rand_vals + index);
13257fd1c63SJoanne Koong 			if (err) {
13357fd1c63SJoanne Koong 				if (err != -ENOENT) {
13457fd1c63SJoanne Koong 					error |= 2;
13557fd1c63SJoanne Koong 					return 0;
13657fd1c63SJoanne Koong 				}
13757fd1c63SJoanne Koong 				log_result(hit_key);
13857fd1c63SJoanne Koong 				continue;
13957fd1c63SJoanne Koong 			}
14057fd1c63SJoanne Koong 		}
14157fd1c63SJoanne Koong 
14257fd1c63SJoanne Koong 		result = bpf_map_lookup_elem(&hashmap,
14357fd1c63SJoanne Koong 					     rand_vals + index);
14457fd1c63SJoanne Koong 		if (result) {
14557fd1c63SJoanne Koong 			log_result(hit_key);
14657fd1c63SJoanne Koong 		} else {
14757fd1c63SJoanne Koong 			if (hashmap_use_bloom && count_false_hits)
14857fd1c63SJoanne Koong 				log_result(false_hit_key);
14957fd1c63SJoanne Koong 			log_result(drop_key);
15057fd1c63SJoanne Koong 		}
15157fd1c63SJoanne Koong 	}
15257fd1c63SJoanne Koong 
15357fd1c63SJoanne Koong 	return 0;
15457fd1c63SJoanne Koong }
155