| // SPDX-License-Identifier: GPL-2.0 |
| /* Copyright (c) 2021 Facebook */ |
| #include <linux/bpf.h> |
| #include <time.h> |
| #include <errno.h> |
| #include <bpf/bpf_helpers.h> |
| #include "bpf_tcp_helpers.h" |
| |
| char _license[] SEC("license") = "GPL"; |
| struct hmap_elem { |
| int counter; |
| struct bpf_timer timer; |
| struct bpf_spin_lock lock; /* unused */ |
| }; |
| |
| struct { |
| __uint(type, BPF_MAP_TYPE_HASH); |
| __uint(max_entries, 1000); |
| __type(key, int); |
| __type(value, struct hmap_elem); |
| } hmap SEC(".maps"); |
| |
| struct { |
| __uint(type, BPF_MAP_TYPE_HASH); |
| __uint(map_flags, BPF_F_NO_PREALLOC); |
| __uint(max_entries, 1000); |
| __type(key, int); |
| __type(value, struct hmap_elem); |
| } hmap_malloc SEC(".maps"); |
| |
| struct elem { |
| struct bpf_timer t; |
| }; |
| |
| struct { |
| __uint(type, BPF_MAP_TYPE_ARRAY); |
| __uint(max_entries, 2); |
| __type(key, int); |
| __type(value, struct elem); |
| } array SEC(".maps"); |
| |
| struct { |
| __uint(type, BPF_MAP_TYPE_LRU_HASH); |
| __uint(max_entries, 4); |
| __type(key, int); |
| __type(value, struct elem); |
| } lru SEC(".maps"); |
| |
| __u64 bss_data; |
| __u64 err; |
| __u64 ok; |
| __u64 callback_check = 52; |
| __u64 callback2_check = 52; |
| |
| #define ARRAY 1 |
| #define HTAB 2 |
| #define HTAB_MALLOC 3 |
| #define LRU 4 |
| |
| /* callback for array and lru timers */ |
| static int timer_cb1(void *map, int *key, struct bpf_timer *timer) |
| { |
| /* increment bss variable twice. |
| * Once via array timer callback and once via lru timer callback |
| */ |
| bss_data += 5; |
| |
| /* *key == 0 - the callback was called for array timer. |
| * *key == 4 - the callback was called from lru timer. |
| */ |
| if (*key == ARRAY) { |
| struct bpf_timer *lru_timer; |
| int lru_key = LRU; |
| |
| /* rearm array timer to be called again in ~35 seconds */ |
| if (bpf_timer_start(timer, 1ull << 35, 0) != 0) |
| err |= 1; |
| |
| lru_timer = bpf_map_lookup_elem(&lru, &lru_key); |
| if (!lru_timer) |
| return 0; |
| bpf_timer_set_callback(lru_timer, timer_cb1); |
| if (bpf_timer_start(lru_timer, 0, 0) != 0) |
| err |= 2; |
| } else if (*key == LRU) { |
| int lru_key, i; |
| |
| for (i = LRU + 1; |
| i <= 100 /* for current LRU eviction algorithm this number |
| * should be larger than ~ lru->max_entries * 2 |
| */; |
| i++) { |
| struct elem init = {}; |
| |
| /* lru_key cannot be used as loop induction variable |
| * otherwise the loop will be unbounded. |
| */ |
| lru_key = i; |
| |
| /* add more elements into lru map to push out current |
| * element and force deletion of this timer |
| */ |
| bpf_map_update_elem(map, &lru_key, &init, 0); |
| /* look it up to bump it into active list */ |
| bpf_map_lookup_elem(map, &lru_key); |
| |
| /* keep adding until *key changes underneath, |
| * which means that key/timer memory was reused |
| */ |
| if (*key != LRU) |
| break; |
| } |
| |
| /* check that the timer was removed */ |
| if (bpf_timer_cancel(timer) != -EINVAL) |
| err |= 4; |
| ok |= 1; |
| } |
| return 0; |
| } |
| |
| SEC("fentry/bpf_fentry_test1") |
| int BPF_PROG(test1, int a) |
| { |
| struct bpf_timer *arr_timer, *lru_timer; |
| struct elem init = {}; |
| int lru_key = LRU; |
| int array_key = ARRAY; |
| |
| arr_timer = bpf_map_lookup_elem(&array, &array_key); |
| if (!arr_timer) |
| return 0; |
| bpf_timer_init(arr_timer, &array, CLOCK_MONOTONIC); |
| |
| bpf_map_update_elem(&lru, &lru_key, &init, 0); |
| lru_timer = bpf_map_lookup_elem(&lru, &lru_key); |
| if (!lru_timer) |
| return 0; |
| bpf_timer_init(lru_timer, &lru, CLOCK_MONOTONIC); |
| |
| bpf_timer_set_callback(arr_timer, timer_cb1); |
| bpf_timer_start(arr_timer, 0 /* call timer_cb1 asap */, 0); |
| |
| /* init more timers to check that array destruction |
| * doesn't leak timer memory. |
| */ |
| array_key = 0; |
| arr_timer = bpf_map_lookup_elem(&array, &array_key); |
| if (!arr_timer) |
| return 0; |
| bpf_timer_init(arr_timer, &array, CLOCK_MONOTONIC); |
| return 0; |
| } |
| |
| /* callback for prealloc and non-prealloca hashtab timers */ |
| static int timer_cb2(void *map, int *key, struct hmap_elem *val) |
| { |
| if (*key == HTAB) |
| callback_check--; |
| else |
| callback2_check--; |
| if (val->counter > 0 && --val->counter) { |
| /* re-arm the timer again to execute after 1 usec */ |
| bpf_timer_start(&val->timer, 1000, 0); |
| } else if (*key == HTAB) { |
| struct bpf_timer *arr_timer; |
| int array_key = ARRAY; |
| |
| /* cancel arr_timer otherwise bpf_fentry_test1 prog |
| * will stay alive forever. |
| */ |
| arr_timer = bpf_map_lookup_elem(&array, &array_key); |
| if (!arr_timer) |
| return 0; |
| if (bpf_timer_cancel(arr_timer) != 1) |
| /* bpf_timer_cancel should return 1 to indicate |
| * that arr_timer was active at this time |
| */ |
| err |= 8; |
| |
| /* try to cancel ourself. It shouldn't deadlock. */ |
| if (bpf_timer_cancel(&val->timer) != -EDEADLK) |
| err |= 16; |
| |
| /* delete this key and this timer anyway. |
| * It shouldn't deadlock either. |
| */ |
| bpf_map_delete_elem(map, key); |
| |
| /* in preallocated hashmap both 'key' and 'val' could have been |
| * reused to store another map element (like in LRU above), |
| * but in controlled test environment the below test works. |
| * It's not a use-after-free. The memory is owned by the map. |
| */ |
| if (bpf_timer_start(&val->timer, 1000, 0) != -EINVAL) |
| err |= 32; |
| ok |= 2; |
| } else { |
| if (*key != HTAB_MALLOC) |
| err |= 64; |
| |
| /* try to cancel ourself. It shouldn't deadlock. */ |
| if (bpf_timer_cancel(&val->timer) != -EDEADLK) |
| err |= 128; |
| |
| /* delete this key and this timer anyway. |
| * It shouldn't deadlock either. |
| */ |
| bpf_map_delete_elem(map, key); |
| |
| /* in non-preallocated hashmap both 'key' and 'val' are RCU |
| * protected and still valid though this element was deleted |
| * from the map. Arm this timer for ~35 seconds. When callback |
| * finishes the call_rcu will invoke: |
| * htab_elem_free_rcu |
| * check_and_free_timer |
| * bpf_timer_cancel_and_free |
| * to cancel this 35 second sleep and delete the timer for real. |
| */ |
| if (bpf_timer_start(&val->timer, 1ull << 35, 0) != 0) |
| err |= 256; |
| ok |= 4; |
| } |
| return 0; |
| } |
| |
| int bpf_timer_test(void) |
| { |
| struct hmap_elem *val; |
| int key = HTAB, key_malloc = HTAB_MALLOC; |
| |
| val = bpf_map_lookup_elem(&hmap, &key); |
| if (val) { |
| if (bpf_timer_init(&val->timer, &hmap, CLOCK_BOOTTIME) != 0) |
| err |= 512; |
| bpf_timer_set_callback(&val->timer, timer_cb2); |
| bpf_timer_start(&val->timer, 1000, 0); |
| } |
| val = bpf_map_lookup_elem(&hmap_malloc, &key_malloc); |
| if (val) { |
| if (bpf_timer_init(&val->timer, &hmap_malloc, CLOCK_BOOTTIME) != 0) |
| err |= 1024; |
| bpf_timer_set_callback(&val->timer, timer_cb2); |
| bpf_timer_start(&val->timer, 1000, 0); |
| } |
| return 0; |
| } |
| |
| SEC("fentry/bpf_fentry_test2") |
| int BPF_PROG(test2, int a, int b) |
| { |
| struct hmap_elem init = {}, *val; |
| int key = HTAB, key_malloc = HTAB_MALLOC; |
| |
| init.counter = 10; /* number of times to trigger timer_cb2 */ |
| bpf_map_update_elem(&hmap, &key, &init, 0); |
| val = bpf_map_lookup_elem(&hmap, &key); |
| if (val) |
| bpf_timer_init(&val->timer, &hmap, CLOCK_BOOTTIME); |
| /* update the same key to free the timer */ |
| bpf_map_update_elem(&hmap, &key, &init, 0); |
| |
| bpf_map_update_elem(&hmap_malloc, &key_malloc, &init, 0); |
| val = bpf_map_lookup_elem(&hmap_malloc, &key_malloc); |
| if (val) |
| bpf_timer_init(&val->timer, &hmap_malloc, CLOCK_BOOTTIME); |
| /* update the same key to free the timer */ |
| bpf_map_update_elem(&hmap_malloc, &key_malloc, &init, 0); |
| |
| /* init more timers to check that htab operations |
| * don't leak timer memory. |
| */ |
| key = 0; |
| bpf_map_update_elem(&hmap, &key, &init, 0); |
| val = bpf_map_lookup_elem(&hmap, &key); |
| if (val) |
| bpf_timer_init(&val->timer, &hmap, CLOCK_BOOTTIME); |
| bpf_map_delete_elem(&hmap, &key); |
| bpf_map_update_elem(&hmap, &key, &init, 0); |
| val = bpf_map_lookup_elem(&hmap, &key); |
| if (val) |
| bpf_timer_init(&val->timer, &hmap, CLOCK_BOOTTIME); |
| |
| /* and with non-prealloc htab */ |
| key_malloc = 0; |
| bpf_map_update_elem(&hmap_malloc, &key_malloc, &init, 0); |
| val = bpf_map_lookup_elem(&hmap_malloc, &key_malloc); |
| if (val) |
| bpf_timer_init(&val->timer, &hmap_malloc, CLOCK_BOOTTIME); |
| bpf_map_delete_elem(&hmap_malloc, &key_malloc); |
| bpf_map_update_elem(&hmap_malloc, &key_malloc, &init, 0); |
| val = bpf_map_lookup_elem(&hmap_malloc, &key_malloc); |
| if (val) |
| bpf_timer_init(&val->timer, &hmap_malloc, CLOCK_BOOTTIME); |
| |
| return bpf_timer_test(); |
| } |