1bd4aed0eSJiong Wang // SPDX-License-Identifier: GPL-2.0
2bd4aed0eSJiong Wang // Copyright (c) 2018 Facebook
3bd4aed0eSJiong Wang 
4bd4aed0eSJiong Wang #include <linux/bpf.h>
53e689141SToke Høiland-Jørgensen #include <bpf/bpf_helpers.h>
6bd4aed0eSJiong Wang 
7bd4aed0eSJiong Wang #ifndef PERF_MAX_STACK_DEPTH
8bd4aed0eSJiong Wang #define PERF_MAX_STACK_DEPTH         127
9bd4aed0eSJiong Wang #endif
10bd4aed0eSJiong Wang 
11df0b7792SAndrii Nakryiko struct {
12bc7430ccSAndrii Nakryiko 	__uint(type, BPF_MAP_TYPE_ARRAY);
13bc7430ccSAndrii Nakryiko 	__uint(max_entries, 1);
14bc7430ccSAndrii Nakryiko 	__type(key, __u32);
15bc7430ccSAndrii Nakryiko 	__type(value, __u32);
16bc7430ccSAndrii Nakryiko } control_map SEC(".maps");
17bd4aed0eSJiong Wang 
18df0b7792SAndrii Nakryiko struct {
19bc7430ccSAndrii Nakryiko 	__uint(type, BPF_MAP_TYPE_HASH);
20bc7430ccSAndrii Nakryiko 	__uint(max_entries, 16384);
21bc7430ccSAndrii Nakryiko 	__type(key, __u32);
22bc7430ccSAndrii Nakryiko 	__type(value, __u32);
23bc7430ccSAndrii Nakryiko } stackid_hmap SEC(".maps");
24bd4aed0eSJiong Wang 
25df0b7792SAndrii Nakryiko typedef struct bpf_stack_build_id stack_trace_t[PERF_MAX_STACK_DEPTH];
26df0b7792SAndrii Nakryiko 
27df0b7792SAndrii Nakryiko struct {
28bc7430ccSAndrii Nakryiko 	__uint(type, BPF_MAP_TYPE_STACK_TRACE);
29bc7430ccSAndrii Nakryiko 	__uint(max_entries, 128);
30bc7430ccSAndrii Nakryiko 	__uint(map_flags, BPF_F_STACK_BUILD_ID);
31bd368cb5SHengqi Chen 	__type(key, __u32);
32bd368cb5SHengqi Chen 	__type(value, stack_trace_t);
33bc7430ccSAndrii Nakryiko } stackmap SEC(".maps");
34bd4aed0eSJiong Wang 
35df0b7792SAndrii Nakryiko struct {
36bc7430ccSAndrii Nakryiko 	__uint(type, BPF_MAP_TYPE_ARRAY);
37bc7430ccSAndrii Nakryiko 	__uint(max_entries, 128);
38bc7430ccSAndrii Nakryiko 	__type(key, __u32);
398981e56fSAndrii Nakryiko 	__type(value, stack_trace_t);
40bc7430ccSAndrii Nakryiko } stack_amap SEC(".maps");
41bd4aed0eSJiong Wang 
42*59ed76feSSong Liu SEC("kprobe/urandom_read_iter")
oncpu(struct pt_regs * args)4399dea2c6SAndrii Nakryiko int oncpu(struct pt_regs *args)
44bd4aed0eSJiong Wang {
45bd4aed0eSJiong Wang 	__u32 max_len = sizeof(struct bpf_stack_build_id)
46bd4aed0eSJiong Wang 			* PERF_MAX_STACK_DEPTH;
47bd4aed0eSJiong Wang 	__u32 key = 0, val = 0, *value_p;
48bd4aed0eSJiong Wang 	void *stack_p;
49bd4aed0eSJiong Wang 
50bd4aed0eSJiong Wang 	value_p = bpf_map_lookup_elem(&control_map, &key);
51bd4aed0eSJiong Wang 	if (value_p && *value_p)
52bd4aed0eSJiong Wang 		return 0; /* skip if non-zero *value_p */
53bd4aed0eSJiong Wang 
54bd4aed0eSJiong Wang 	/* The size of stackmap and stackid_hmap should be the same */
55bd4aed0eSJiong Wang 	key = bpf_get_stackid(args, &stackmap, BPF_F_USER_STACK);
56bd4aed0eSJiong Wang 	if ((int)key >= 0) {
57bd4aed0eSJiong Wang 		bpf_map_update_elem(&stackid_hmap, &key, &val, 0);
58bd4aed0eSJiong Wang 		stack_p = bpf_map_lookup_elem(&stack_amap, &key);
59bd4aed0eSJiong Wang 		if (stack_p)
60bd4aed0eSJiong Wang 			bpf_get_stack(args, stack_p, max_len,
61bd4aed0eSJiong Wang 				      BPF_F_USER_STACK | BPF_F_USER_BUILD_ID);
62bd4aed0eSJiong Wang 	}
63bd4aed0eSJiong Wang 
64bd4aed0eSJiong Wang 	return 0;
65bd4aed0eSJiong Wang }
66bd4aed0eSJiong Wang 
67bd4aed0eSJiong Wang char _license[] SEC("license") = "GPL";
68