From patchwork Mon Oct 2 23:47:07 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Vernet X-Patchwork-Id: 147578 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:612c:2a8e:b0:403:3b70:6f57 with SMTP id in14csp1757259vqb; Mon, 2 Oct 2023 16:47:56 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEkb9NmlYNrE9z4SMlrNKxJzjVQ0pMSzy0BhIOX3gPFwjdYHgLZus4nMxcvS9+2DTtePAdF X-Received: by 2002:a05:6358:72a4:b0:14d:b8d3:97e5 with SMTP id w36-20020a05635872a400b0014db8d397e5mr12870575rwf.20.1696290476569; Mon, 02 Oct 2023 16:47:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696290476; cv=none; d=google.com; s=arc-20160816; b=ShcsNadBuimfOSKNiKd8E38poGLuvF6cqSj9B1+Qudi3Cb7bEQ/LMG56kj4CqZeAXL 3eEWPqPRnGMBX2oPfrWRUMYWFegfRndcuakKOp6ga2W5b5JlztZ5RIn6GhOGt6drLhRA S8MWbwMfVtk0iFqW5NShv/6n6rIq/NPnuqDJCpdHoEFPlQ1ZC+0iSCg2h2fUWSNvdqV6 sh0UZg3pFS1lLECS9noYQOMBba3O3rzhkh9H8cDXc+LUTSKer9NzP+bOUwYvwUzSYNv/ 88gpsU4RV3xPOQ59WgVG8upMpZxs3X2Y0vfWKVHx7tD+7MZJuxZGWfREmyN6QZYKVyru Iifg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=DVMLROc3eiE12rYXMNdufnFTC1ndnWQSfH8g24Ty96g=; fh=+xswMKcdOGWx3YoVcouoA/LViA7AygFoPJpk6kRm3TE=; b=XmLbw2q8jfgw9ant/NyCQAffkVeVRZpN+JrAUjnau5DeVqx+S1qHCkjxQ1/3dZUN60 7chhnHDu+WmT92Bzjcp9pWmUaizOXpnDCRLPRqsDOW3yU37Ctt9M8Z2NXcKiKQbsqLOY W70jWkw9wi+lGydr1KhhxjklDoaovbIuqT+0o8sJYK4PeMKAPItf+o12kU9DkgA80awn iPMB6NubsteX6YIDQTD5UFK1nlIkX4IpyHb2MFbAdiCxvwo6uxLONiLgThVZH+ixvBWV y8bKkwLASkZn+kgktz5/Fm0+7fNrADo5GHT4yTD89voNF4LtkSL0PteNv7cIqnKcMGCx iSuA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id f21-20020a056a00239500b00690d457764fsi150009pfc.42.2023.10.02.16.47.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 Oct 2023 16:47:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 7B4A280CFD75; Mon, 2 Oct 2023 16:47:54 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236963AbjJBXrQ (ORCPT + 18 others); Mon, 2 Oct 2023 19:47:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48050 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229549AbjJBXrP (ORCPT ); Mon, 2 Oct 2023 19:47:15 -0400 Received: from mail-pj1-f42.google.com (mail-pj1-f42.google.com [209.85.216.42]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6E00FBD; Mon, 2 Oct 2023 16:47:12 -0700 (PDT) Received: by mail-pj1-f42.google.com with SMTP id 98e67ed59e1d1-27740ce6c76so218614a91.0; Mon, 02 Oct 2023 16:47:12 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696290431; x=1696895231; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=DVMLROc3eiE12rYXMNdufnFTC1ndnWQSfH8g24Ty96g=; b=syc24e3HDi4jCjnINXIafc+MiQ+6RKA29oVfw1zXZW3G2wMOkRPYg6gC1hj1v3k9A5 gu8hl85I0/mjG5G3rlnvda4iiVflTRbQfqWcH85Wz3UhipYyqjOEYAqmoq75CBZ6ANhM rEtHQ9vzODiEAENam4WA0sN47xS+j3zyhh5SCeZvq390vW3165NR25jazfbkqoHboS7W FkoB0HqXLO/hJ2Qda35Q9v/xh0qqw57ObAyAyZwFuB/YyLa8vZ0g+yTbSKeWgY1mlaNs mnlye3r37TzLry7JUOV59wNOx/XBTndRjUwdblvtCtGz/hEP7Nw/sh71PHRnTlH84w1s 0bWw== X-Gm-Message-State: AOJu0YzygmUwIhKoH00gCsi7hSb0ncJuTegGWiPFYtriM9Oe+BTnx3mG iRU3cAARQhfFBNmh3C/4hl8p4WYS6XhrKSSG X-Received: by 2002:a17:90a:16c1:b0:274:748c:9c55 with SMTP id y1-20020a17090a16c100b00274748c9c55mr10070476pje.20.1696290431298; Mon, 02 Oct 2023 16:47:11 -0700 (PDT) Received: from localhost ([2620:10d:c090:400::4:d0e0]) by smtp.gmail.com with ESMTPSA id ji17-20020a170903325100b001c444106bcasm28340plb.46.2023.10.02.16.47.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 Oct 2023 16:47:10 -0700 (PDT) From: David Vernet To: bpf@vger.kernel.org Cc: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, song@kernel.org, yonghong.song@linux.dev, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com, haoluo@google.com, jolsa@kernel.org, linux-kernel@vger.kernel.org, kernel-team@meta.com, himadrispandya@gmail.com, julia.lawall@inria.fr Subject: [PATCH bpf-next 1/2] bpf: Add ability to pin bpf timer to calling CPU Date: Mon, 2 Oct 2023 18:47:07 -0500 Message-ID: <20231002234708.331192-1-void@manifault.com> X-Mailer: git-send-email 2.41.0 MIME-Version: 1.0 X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Mon, 02 Oct 2023 16:47:54 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1778689482410205164 X-GMAIL-MSGID: 1778689482410205164 BPF supports creating high resolution timers using bpf_timer_* helper functions. Currently, only the BPF_F_TIMER_ABS flag is supported, which specifies that the timeout should be interpreted as absolute time. It would also be useful to be able to pin that timer to a core. For example, if you wanted to make a subset of cores run without timer interrupts, and only have the timer be invoked on a single core. This patch adds support for this with a new BPF_F_TIMER_CPU_PIN flag. When specified, the HRTIMER_MODE_PINNED flag is passed to hrtimer_start(). A subsequent patch will update selftests to validate. Signed-off-by: David Vernet Acked-by: Song Liu --- include/uapi/linux/bpf.h | 4 ++++ kernel/bpf/helpers.c | 5 ++++- tools/include/uapi/linux/bpf.h | 4 ++++ 3 files changed, 12 insertions(+), 1 deletion(-) diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h index 70bfa997e896..a7d4a1a69f21 100644 --- a/include/uapi/linux/bpf.h +++ b/include/uapi/linux/bpf.h @@ -5096,6 +5096,8 @@ union bpf_attr { * **BPF_F_TIMER_ABS** * Start the timer in absolute expire value instead of the * default relative one. + * **BPF_F_TIMER_CPU_PIN** + * Timer will be pinned to the CPU of the caller. * * Return * 0 on success. @@ -7309,9 +7311,11 @@ struct bpf_core_relo { * Flags to control bpf_timer_start() behaviour. * - BPF_F_TIMER_ABS: Timeout passed is absolute time, by default it is * relative to current time. + * - BPF_F_TIMER_CPU_PIN: Timer will be pinned to the CPU of the caller. */ enum { BPF_F_TIMER_ABS = (1ULL << 0), + BPF_F_TIMER_CPU_PIN = (1ULL << 1), }; /* BPF numbers iterator state */ diff --git a/kernel/bpf/helpers.c b/kernel/bpf/helpers.c index dd1c69ee3375..d2840dd5b00d 100644 --- a/kernel/bpf/helpers.c +++ b/kernel/bpf/helpers.c @@ -1272,7 +1272,7 @@ BPF_CALL_3(bpf_timer_start, struct bpf_timer_kern *, timer, u64, nsecs, u64, fla if (in_nmi()) return -EOPNOTSUPP; - if (flags > BPF_F_TIMER_ABS) + if (flags & ~(BPF_F_TIMER_ABS | BPF_F_TIMER_CPU_PIN)) return -EINVAL; __bpf_spin_lock_irqsave(&timer->lock); t = timer->timer; @@ -1286,6 +1286,9 @@ BPF_CALL_3(bpf_timer_start, struct bpf_timer_kern *, timer, u64, nsecs, u64, fla else mode = HRTIMER_MODE_REL_SOFT; + if (flags & BPF_F_TIMER_CPU_PIN) + mode |= HRTIMER_MODE_PINNED; + hrtimer_start(&t->timer, ns_to_ktime(nsecs), mode); out: __bpf_spin_unlock_irqrestore(&timer->lock); diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h index 70bfa997e896..a7d4a1a69f21 100644 --- a/tools/include/uapi/linux/bpf.h +++ b/tools/include/uapi/linux/bpf.h @@ -5096,6 +5096,8 @@ union bpf_attr { * **BPF_F_TIMER_ABS** * Start the timer in absolute expire value instead of the * default relative one. + * **BPF_F_TIMER_CPU_PIN** + * Timer will be pinned to the CPU of the caller. * * Return * 0 on success. @@ -7309,9 +7311,11 @@ struct bpf_core_relo { * Flags to control bpf_timer_start() behaviour. * - BPF_F_TIMER_ABS: Timeout passed is absolute time, by default it is * relative to current time. + * - BPF_F_TIMER_CPU_PIN: Timer will be pinned to the CPU of the caller. */ enum { BPF_F_TIMER_ABS = (1ULL << 0), + BPF_F_TIMER_CPU_PIN = (1ULL << 1), }; /* BPF numbers iterator state */ From patchwork Mon Oct 2 23:47:08 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Vernet X-Patchwork-Id: 147577 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:612c:2a8e:b0:403:3b70:6f57 with SMTP id in14csp1757201vqb; Mon, 2 Oct 2023 16:47:44 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEwKsGSrVg7jDQ5n/psIa6cA6qstcgTAIcVcbyhIqH3/kEmKyGJ0Wva172/Tks4WuDMKH0p X-Received: by 2002:a05:6a00:a13:b0:682:4c1c:a0fc with SMTP id p19-20020a056a000a1300b006824c1ca0fcmr15310254pfh.19.1696290464441; Mon, 02 Oct 2023 16:47:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696290464; cv=none; d=google.com; s=arc-20160816; b=igsVQni7rKrzw1PpL1BfN3jo71fOCsNFZgsKYmW4+seuD478SVlfmvL6U2xYgqRK3e fMQTjPLKiTlRK9/g5ok3VTUAzebd0vA5wKBW06S3qEMhwkJztvVX/K2PnlEtLnkQCtms YXzAsPg4PRh1/MzB0mwKttWb7+kpvr1N2cCmwsfJTkmULE1tUWDwXsIr5QXwz7ptd+iX 5KtSKkdI7r3r7cTNLIxMQh15Ps8CBXrRV7TpLiAHkr6GMW1ayzvYErBnfe+xPgKAq5ms a64rfXx+ZRs3paOS1tpTpncnb6qVdz2ShPUpmP3pAqfFdK/TbwTuMj7COiJEalVoZB+/ z9zA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=/wzzKUe/S8MKLxWxB+dTpANkK30HpVTpho7RkzNp9HU=; fh=+xswMKcdOGWx3YoVcouoA/LViA7AygFoPJpk6kRm3TE=; b=FkKANwNBBA2XFjLyRcGsCvFEeCGgdm4IZ1MKV8kDGtu40/8ec5Dc9A+rRKgUqjQQEB oDKmfzK8W9uYs9cwpVAndHjamiMS9b201oN/QNFu/ru2Ekury3QDrpjCYnANS/xrVf1K zSVKyazT2F+Ll0l0/DZXojNBP4O+2wNbL+dY4UV0/qVg3raoCZkaqxtU5cWiofpKf7h5 5ttQK7Mz5x9gphpcjrMNmozvb35j/Y+Yg9LAN3MEmMG4/x7EWwsdy5bYvp8jtK/8KaDr T03RXrksSRBCB0ArMisf8PPk7pfWj23gNEr4UGovcC74vwlzoWJhbU6G2tSzLgGqq8vj PkEg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from pete.vger.email (pete.vger.email. [2620:137:e000::3:6]) by mx.google.com with ESMTPS id i125-20020a639d83000000b00563d791d978si61824pgd.750.2023.10.02.16.47.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 Oct 2023 16:47:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) client-ip=2620:137:e000::3:6; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 4CDCF8070ECC; Mon, 2 Oct 2023 16:47:41 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237232AbjJBXrV (ORCPT + 18 others); Mon, 2 Oct 2023 19:47:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48070 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229549AbjJBXrR (ORCPT ); Mon, 2 Oct 2023 19:47:17 -0400 Received: from mail-pg1-f176.google.com (mail-pg1-f176.google.com [209.85.215.176]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 879EACC; Mon, 2 Oct 2023 16:47:14 -0700 (PDT) Received: by mail-pg1-f176.google.com with SMTP id 41be03b00d2f7-5859a7d6556so185881a12.0; Mon, 02 Oct 2023 16:47:14 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696290434; x=1696895234; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=/wzzKUe/S8MKLxWxB+dTpANkK30HpVTpho7RkzNp9HU=; b=JGZXPKN5C88bONLmHTu2b+WahjPJe/spGq8m56Xh9fBqJ6dl6qJs/yjQx2I9bXvVg1 TpRD8MfphdqbENu8Wdowr6LfPJxX33DN4Eduo7KOtECns27+DG4bSPozuCPV/ce6ICje jK2M2kkDuhXaYPiELQI6bpUFN8MpvbMT2Jr29d3/wQ2rMhGx8wCL1z/TQ+3RHnuKijyp /vaWt6to5pnIPkw3yzqdwcD8dZOhomdAfuv1fvjTS875WFI4ZWJ0n+TtVGRzl8BnC5cz tzPKCddwbvkSZq/+RCWYzXFoxMyGP/bRsU2LWjUjNwGuFlP544bfZSi6aMCJtH4xOC7p oBRA== X-Gm-Message-State: AOJu0YzpASAx7My8RFcUqO8CfJh+GfOs9aNpeZXrvUrj2VSfvYUg9K0O wp0sLnOPOablTTVirlnJhAaZBhva55bTFeH8 X-Received: by 2002:a05:6a20:9184:b0:153:8754:8a7e with SMTP id v4-20020a056a20918400b0015387548a7emr14828886pzd.3.1696290433610; Mon, 02 Oct 2023 16:47:13 -0700 (PDT) Received: from localhost ([2620:10d:c090:400::4:d0e0]) by smtp.gmail.com with ESMTPSA id g6-20020a170902740600b001b5656b0bf9sm13876pll.286.2023.10.02.16.47.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 Oct 2023 16:47:13 -0700 (PDT) From: David Vernet To: bpf@vger.kernel.org Cc: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, song@kernel.org, yonghong.song@linux.dev, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com, haoluo@google.com, jolsa@kernel.org, linux-kernel@vger.kernel.org, kernel-team@meta.com, himadrispandya@gmail.com, julia.lawall@inria.fr Subject: [PATCH bpf-next 2/2] bpf/selftests: Test pinning bpf timer to a core Date: Mon, 2 Oct 2023 18:47:08 -0500 Message-ID: <20231002234708.331192-2-void@manifault.com> X-Mailer: git-send-email 2.41.0 In-Reply-To: <20231002234708.331192-1-void@manifault.com> References: <20231002234708.331192-1-void@manifault.com> MIME-Version: 1.0 X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Mon, 02 Oct 2023 16:47:41 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1778689469868510347 X-GMAIL-MSGID: 1778689469868510347 Now that we support pinning a BPF timer to the current core, we should test it with some selftests. This patch adds two new testcases to the timer suite, which verifies that a BPF timer both with and without BPF_F_TIMER_ABS, can be pinned to the calling core with BPF_F_TIMER_CPU_PIN. Signed-off-by: David Vernet Acked-by: Song Liu --- .../testing/selftests/bpf/prog_tests/timer.c | 4 + tools/testing/selftests/bpf/progs/timer.c | 75 +++++++++++++++++++ 2 files changed, 79 insertions(+) diff --git a/tools/testing/selftests/bpf/prog_tests/timer.c b/tools/testing/selftests/bpf/prog_tests/timer.c index 290c21dbe65a..d8bc838445ec 100644 --- a/tools/testing/selftests/bpf/prog_tests/timer.c +++ b/tools/testing/selftests/bpf/prog_tests/timer.c @@ -14,6 +14,7 @@ static int timer(struct timer *timer_skel) ASSERT_EQ(timer_skel->data->callback_check, 52, "callback_check1"); ASSERT_EQ(timer_skel->data->callback2_check, 52, "callback2_check1"); + ASSERT_EQ(timer_skel->bss->pinned_callback_check, 0, "pinned_callback_check1"); prog_fd = bpf_program__fd(timer_skel->progs.test1); err = bpf_prog_test_run_opts(prog_fd, &topts); @@ -32,6 +33,9 @@ static int timer(struct timer *timer_skel) /* check that timer_cb3() was executed twice */ ASSERT_EQ(timer_skel->bss->abs_data, 12, "abs_data"); + /* check that timer_cb_pinned() was executed twice */ + ASSERT_EQ(timer_skel->bss->pinned_callback_check, 2, "pinned_callback_check"); + /* check that there were no errors in timer execution */ ASSERT_EQ(timer_skel->bss->err, 0, "err"); diff --git a/tools/testing/selftests/bpf/progs/timer.c b/tools/testing/selftests/bpf/progs/timer.c index 9a16d95213e1..0112b9c038b4 100644 --- a/tools/testing/selftests/bpf/progs/timer.c +++ b/tools/testing/selftests/bpf/progs/timer.c @@ -53,12 +53,28 @@ struct { __type(value, struct elem); } abs_timer SEC(".maps"); +struct { + __uint(type, BPF_MAP_TYPE_ARRAY); + __uint(max_entries, 1); + __type(key, int); + __type(value, struct elem); +} soft_timer_pinned SEC(".maps"); + +struct { + __uint(type, BPF_MAP_TYPE_ARRAY); + __uint(max_entries, 1); + __type(key, int); + __type(value, struct elem); +} abs_timer_pinned SEC(".maps"); + __u64 bss_data; __u64 abs_data; __u64 err; __u64 ok; __u64 callback_check = 52; __u64 callback2_check = 52; +__u64 pinned_callback_check; +__s32 pinned_cpu; #define ARRAY 1 #define HTAB 2 @@ -329,3 +345,62 @@ int BPF_PROG2(test3, int, a) return 0; } + +/* callback for pinned timer */ +static int timer_cb_pinned(void *map, int *key, struct bpf_timer *timer) +{ + __s32 cpu = bpf_get_smp_processor_id(); + + if (cpu != pinned_cpu) + err |= 16384; + + pinned_callback_check++; + return 0; +} + +static void test_pinned_timer(bool soft) +{ + int key = 0; + void *map; + struct bpf_timer *timer; + __u64 flags = BPF_F_TIMER_CPU_PIN; + __u64 start_time; + + if (soft) { + map = &soft_timer_pinned; + start_time = 0; + } else { + map = &abs_timer_pinned; + start_time = bpf_ktime_get_boot_ns(); + flags |= BPF_F_TIMER_ABS; + } + + timer = bpf_map_lookup_elem(map, &key); + if (timer) { + if (bpf_timer_init(timer, map, CLOCK_BOOTTIME) != 0) + err |= 4096; + bpf_timer_set_callback(timer, timer_cb_pinned); + pinned_cpu = bpf_get_smp_processor_id(); + bpf_timer_start(timer, start_time + 1000, flags); + } else { + err |= 8192; + } +} + +SEC("fentry/bpf_fentry_test4") +int BPF_PROG2(test4, int, a) +{ + bpf_printk("test4"); + test_pinned_timer(true); + + return 0; +} + +SEC("fentry/bpf_fentry_test5") +int BPF_PROG2(test5, int, a) +{ + bpf_printk("test5"); + test_pinned_timer(false); + + return 0; +}