xref: /linux/tools/testing/selftests/bpf/progs/test_ringbuf_map_key.c (revision 34dc1baba215b826e454b8d19e4f24adbeb7d00d)
1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (c) 2022 Meta Platforms, Inc. and affiliates. */
3 
4 #include <linux/bpf.h>
5 #include <bpf/bpf_helpers.h>
6 #include "bpf_misc.h"
7 
8 char _license[] SEC("license") = "GPL";
9 
10 struct sample {
11 	int pid;
12 	int seq;
13 	long value;
14 	char comm[16];
15 };
16 
17 struct {
18 	__uint(type, BPF_MAP_TYPE_RINGBUF);
19 } ringbuf SEC(".maps");
20 
21 struct {
22 	__uint(type, BPF_MAP_TYPE_HASH);
23 	__uint(max_entries, 1000);
24 	__type(key, struct sample);
25 	__type(value, int);
26 } hash_map SEC(".maps");
27 
28 /* inputs */
29 int pid = 0;
30 
31 /* inner state */
32 long seq = 0;
33 
34 SEC("fentry/" SYS_PREFIX "sys_getpgid")
35 int test_ringbuf_mem_map_key(void *ctx)
36 {
37 	int cur_pid = bpf_get_current_pid_tgid() >> 32;
38 	struct sample *sample, sample_copy;
39 	int *lookup_val;
40 
41 	if (cur_pid != pid)
42 		return 0;
43 
44 	sample = bpf_ringbuf_reserve(&ringbuf, sizeof(*sample), 0);
45 	if (!sample)
46 		return 0;
47 
48 	sample->pid = pid;
49 	bpf_get_current_comm(sample->comm, sizeof(sample->comm));
50 	sample->seq = ++seq;
51 	sample->value = 42;
52 
53 	/* test using 'sample' (PTR_TO_MEM | MEM_ALLOC) as map key arg
54 	 */
55 	lookup_val = (int *)bpf_map_lookup_elem(&hash_map, sample);
56 	__sink(lookup_val);
57 
58 	/* workaround - memcpy is necessary so that verifier doesn't
59 	 * complain with:
60 	 *   verifier internal error: more than one arg with ref_obj_id R3
61 	 * when trying to do bpf_map_update_elem(&hash_map, sample, &sample->seq, BPF_ANY);
62 	 *
63 	 * Since bpf_map_lookup_elem above uses 'sample' as key, test using
64 	 * sample field as value below
65 	 */
66 	__builtin_memcpy(&sample_copy, sample, sizeof(struct sample));
67 	bpf_map_update_elem(&hash_map, &sample_copy, &sample->seq, BPF_ANY);
68 
69 	bpf_ringbuf_submit(sample, 0);
70 	return 0;
71 }
72