Message ID | 20211118010404.2415864-3-joannekoong@fb.com (mailing list archive) |
---|---|
State | Changes Requested |
Delegated to: | BPF |
Headers | show |
Series | Add bpf_for_each helper | expand |
Context | Check | Description |
---|---|---|
bpf/vmtest-bpf-next-PR | fail | PR summary |
netdev/tree_selection | success | Clearly marked for bpf-next |
netdev/apply | fail | Patch does not apply to bpf-next |
bpf/vmtest-bpf-next | fail | VM_Test |
On Wed, Nov 17, 2021 at 5:07 PM Joanne Koong <joannekoong@fb.com> wrote: > > In this patch - > 1) Add a new prog "for_each_helper" which tests the basic functionality of > the bpf_for_each helper. > > 2) Add pyperf600_foreach and strobemeta_foreach to test the performance > of using bpf_for_each instead of a for loop > > The results of pyperf600 and strobemeta are as follows: > > ~strobemeta~ > > Baseline > verification time 6808200 usec > stack depth 496 > processed 592132 insns (limit 1000000) max_states_per_insn 14 > total_states 16018 peak_states 13684 mark_read 3132 > #188 verif_scale_strobemeta:OK (unrolled loop) > > Using bpf_for_each > verification time 31589 usec > stack depth 96+408 > processed 1630 insns (limit 1000000) max_states_per_insn 4 > total_states 107 peak_states 107 mark_read 60 > #189 verif_scale_strobemeta_foreach:OK > > ~pyperf600~ > > Baseline > verification time 29702486 usec > stack depth 368 > processed 626838 insns (limit 1000000) max_states_per_insn 7 > total_states 30368 peak_states 30279 mark_read 748 > #182 verif_scale_pyperf600:OK (unrolled loop) > > Using bpf_for_each > verification time 148488 usec 200x, this is awesome > stack depth 320+40 > processed 10518 insns (limit 1000000) max_states_per_insn 10 > total_states 705 peak_states 517 mark_read 38 > #183 verif_scale_pyperf600_foreach:OK > > Using the bpf_for_each helper led to approximately a 100% decrease > in the verification time and in the number of instructions. > > Signed-off-by: Joanne Koong <joannekoong@fb.com> > --- > .../bpf/prog_tests/bpf_verif_scale.c | 12 +++ > .../selftests/bpf/prog_tests/for_each.c | 61 ++++++++++++++++ > .../selftests/bpf/progs/for_each_helper.c | 69 ++++++++++++++++++ > tools/testing/selftests/bpf/progs/pyperf.h | 70 +++++++++++++++++- > .../selftests/bpf/progs/pyperf600_foreach.c | 5 ++ > .../testing/selftests/bpf/progs/strobemeta.h | 73 ++++++++++++++++++- > .../selftests/bpf/progs/strobemeta_foreach.c | 9 +++ let's split out strobemeta and pyperf refactorings into a separate patch from dedicated tests for bpf_for_each helper, they are logically quite different and independent > 7 files changed, 295 insertions(+), 4 deletions(-) > create mode 100644 tools/testing/selftests/bpf/progs/for_each_helper.c > create mode 100644 tools/testing/selftests/bpf/progs/pyperf600_foreach.c > create mode 100644 tools/testing/selftests/bpf/progs/strobemeta_foreach.c > > diff --git a/tools/testing/selftests/bpf/prog_tests/bpf_verif_scale.c b/tools/testing/selftests/bpf/prog_tests/bpf_verif_scale.c > index 867349e4ed9e..77396484fde7 100644 > --- a/tools/testing/selftests/bpf/prog_tests/bpf_verif_scale.c > +++ b/tools/testing/selftests/bpf/prog_tests/bpf_verif_scale.c > @@ -115,6 +115,12 @@ void test_verif_scale_pyperf600() > scale_test("pyperf600.o", BPF_PROG_TYPE_RAW_TRACEPOINT, false); > } > > +void test_verif_scale_pyperf600_foreach(void) > +{ > + /* use the bpf_for_each helper*/ > + scale_test("pyperf600_foreach.o", BPF_PROG_TYPE_RAW_TRACEPOINT, false); > +} > + > void test_verif_scale_pyperf600_nounroll() > { > /* no unroll at all. > @@ -165,6 +171,12 @@ void test_verif_scale_strobemeta() > scale_test("strobemeta.o", BPF_PROG_TYPE_RAW_TRACEPOINT, false); > } > > +void test_verif_scale_strobemeta_foreach(void) > +{ > + /* use the bpf_for_each helper*/ > + scale_test("strobemeta_foreach.o", BPF_PROG_TYPE_RAW_TRACEPOINT, false); > +} > + > void test_verif_scale_strobemeta_nounroll1() > { > /* no unroll, tiny loops */ > diff --git a/tools/testing/selftests/bpf/prog_tests/for_each.c b/tools/testing/selftests/bpf/prog_tests/for_each.c > index 68eb12a287d4..529573a82334 100644 > --- a/tools/testing/selftests/bpf/prog_tests/for_each.c > +++ b/tools/testing/selftests/bpf/prog_tests/for_each.c > @@ -4,6 +4,7 @@ > #include <network_helpers.h> > #include "for_each_hash_map_elem.skel.h" > #include "for_each_array_map_elem.skel.h" > +#include "for_each_helper.skel.h" > > static unsigned int duration; > > @@ -121,10 +122,70 @@ static void test_array_map(void) > for_each_array_map_elem__destroy(skel); > } > > +static void test_for_each_helper(void) > +{ > + struct for_each_helper *skel; > + __u32 retval; > + int err; > + > + skel = for_each_helper__open_and_load(); > + if (!ASSERT_OK_PTR(skel, "for_each_helper__open_and_load")) > + return; > + > + skel->bss->nr_iterations = 100; > + err = bpf_prog_test_run(bpf_program__fd(skel->progs.test_prog), > + 1, &pkt_v4, sizeof(pkt_v4), NULL, NULL, > + &retval, &duration); > + if (CHECK(err || retval, "bpf_for_each helper test_prog", please don't use CHECK() in new test, stick to ASSERT_XXX() > + "err %d errno %d retval %d\n", err, errno, retval)) > + goto out; > + ASSERT_EQ(skel->bss->nr_iterations_completed, skel->bss->nr_iterations, > + "nr_iterations mismatch"); > + ASSERT_EQ(skel->bss->g_output, (100 * 99) / 2, "wrong output"); > + > + /* test callback_fn returning 1 to stop iteration */ > + skel->bss->nr_iterations = 400; > + skel->data->stop_index = 50; > + err = bpf_prog_test_run(bpf_program__fd(skel->progs.test_prog), > + 1, &pkt_v4, sizeof(pkt_v4), NULL, NULL, > + &retval, &duration); > + if (CHECK(err || retval, "bpf_for_each helper test_prog", > + "err %d errno %d retval %d\n", err, errno, retval)) > + goto out; > + ASSERT_EQ(skel->bss->nr_iterations_completed, skel->data->stop_index + 1, > + "stop_index not followed"); > + ASSERT_EQ(skel->bss->g_output, (50 * 49) / 2, "wrong output"); > + > + /* test passing in a null ctx */ > + skel->bss->nr_iterations = 10; > + err = bpf_prog_test_run(bpf_program__fd(skel->progs.prog_null_ctx), > + 1, &pkt_v4, sizeof(pkt_v4), NULL, NULL, > + &retval, &duration); > + if (CHECK(err || retval, "bpf_for_each helper prog_null_ctx", > + "err %d errno %d retval %d\n", err, errno, retval)) > + goto out; > + ASSERT_EQ(skel->bss->nr_iterations_completed, skel->bss->nr_iterations, > + "nr_iterations mismatch"); > + > + /* test invalid flags */ > + err = bpf_prog_test_run(bpf_program__fd(skel->progs.prog_invalid_flags), > + 1, &pkt_v4, sizeof(pkt_v4), NULL, NULL, > + &retval, &duration); > + if (CHECK(err || retval, "bpf_for_each helper prog_invalid_flags", > + "err %d errno %d retval %d\n", err, errno, retval)) > + goto out; > + ASSERT_EQ(skel->bss->err, -EINVAL, "invalid_flags"); > + > +out: > + for_each_helper__destroy(skel); > +} > + > void test_for_each(void) > { > if (test__start_subtest("hash_map")) > test_hash_map(); > if (test__start_subtest("array_map")) > test_array_map(); > + if (test__start_subtest("for_each_helper")) > + test_for_each_helper(); those hash_map and array_map are conceptually very different tests, it's probably best to have a separate file under prog_tests dedicated to this new helper. > } > diff --git a/tools/testing/selftests/bpf/progs/for_each_helper.c b/tools/testing/selftests/bpf/progs/for_each_helper.c > new file mode 100644 > index 000000000000..4404d0cb32a6 > --- /dev/null > +++ b/tools/testing/selftests/bpf/progs/for_each_helper.c > @@ -0,0 +1,69 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* Copyright (c) 2021 Facebook */ > + > +#include "vmlinux.h" > +#include <bpf/bpf_helpers.h> > + > +char _license[] SEC("license") = "GPL"; > + > +struct callback_ctx { > + int output; > +}; > + > +/* This should be set by the user program */ > +u32 nr_iterations; > +u32 stop_index = -1; > + > +/* Making these global variables so that the userspace program > + * can verify the output through the skeleton > + */ > +int nr_iterations_completed; > +int g_output; > +int err; > + > +static int callback_fn(__u32 index, void *data) > +{ > + struct callback_ctx *ctx = data; > + > + if (index >= stop_index) > + return 1; > + > + ctx->output += index; > + > + return 0; > +} > + > +static int empty_callback_fn(__u32 index, void *data) > +{ > + return 0; > +} > + > +SEC("tc") > +int test_prog(struct __sk_buff *skb) > +{ > + struct callback_ctx data = {}; > + > + nr_iterations_completed = bpf_for_each(nr_iterations, callback_fn, &data, 0); > + > + g_output = data.output; > + > + return 0; > +} > + > +SEC("tc") > +int prog_null_ctx(struct __sk_buff *skb) > +{ > + nr_iterations_completed = bpf_for_each(nr_iterations, empty_callback_fn, NULL, 0); > + > + return 0; > +} > + > +SEC("tc") > +int prog_invalid_flags(struct __sk_buff *skb) > +{ > + struct callback_ctx data = {}; > + > + err = bpf_for_each(nr_iterations, callback_fn, &data, 1); > + > + return 0; > +} You mentioned that nested loops works, let's have a test for that. [...]
diff --git a/tools/testing/selftests/bpf/prog_tests/bpf_verif_scale.c b/tools/testing/selftests/bpf/prog_tests/bpf_verif_scale.c index 867349e4ed9e..77396484fde7 100644 --- a/tools/testing/selftests/bpf/prog_tests/bpf_verif_scale.c +++ b/tools/testing/selftests/bpf/prog_tests/bpf_verif_scale.c @@ -115,6 +115,12 @@ void test_verif_scale_pyperf600() scale_test("pyperf600.o", BPF_PROG_TYPE_RAW_TRACEPOINT, false); } +void test_verif_scale_pyperf600_foreach(void) +{ + /* use the bpf_for_each helper*/ + scale_test("pyperf600_foreach.o", BPF_PROG_TYPE_RAW_TRACEPOINT, false); +} + void test_verif_scale_pyperf600_nounroll() { /* no unroll at all. @@ -165,6 +171,12 @@ void test_verif_scale_strobemeta() scale_test("strobemeta.o", BPF_PROG_TYPE_RAW_TRACEPOINT, false); } +void test_verif_scale_strobemeta_foreach(void) +{ + /* use the bpf_for_each helper*/ + scale_test("strobemeta_foreach.o", BPF_PROG_TYPE_RAW_TRACEPOINT, false); +} + void test_verif_scale_strobemeta_nounroll1() { /* no unroll, tiny loops */ diff --git a/tools/testing/selftests/bpf/prog_tests/for_each.c b/tools/testing/selftests/bpf/prog_tests/for_each.c index 68eb12a287d4..529573a82334 100644 --- a/tools/testing/selftests/bpf/prog_tests/for_each.c +++ b/tools/testing/selftests/bpf/prog_tests/for_each.c @@ -4,6 +4,7 @@ #include <network_helpers.h> #include "for_each_hash_map_elem.skel.h" #include "for_each_array_map_elem.skel.h" +#include "for_each_helper.skel.h" static unsigned int duration; @@ -121,10 +122,70 @@ static void test_array_map(void) for_each_array_map_elem__destroy(skel); } +static void test_for_each_helper(void) +{ + struct for_each_helper *skel; + __u32 retval; + int err; + + skel = for_each_helper__open_and_load(); + if (!ASSERT_OK_PTR(skel, "for_each_helper__open_and_load")) + return; + + skel->bss->nr_iterations = 100; + err = bpf_prog_test_run(bpf_program__fd(skel->progs.test_prog), + 1, &pkt_v4, sizeof(pkt_v4), NULL, NULL, + &retval, &duration); + if (CHECK(err || retval, "bpf_for_each helper test_prog", + "err %d errno %d retval %d\n", err, errno, retval)) + goto out; + ASSERT_EQ(skel->bss->nr_iterations_completed, skel->bss->nr_iterations, + "nr_iterations mismatch"); + ASSERT_EQ(skel->bss->g_output, (100 * 99) / 2, "wrong output"); + + /* test callback_fn returning 1 to stop iteration */ + skel->bss->nr_iterations = 400; + skel->data->stop_index = 50; + err = bpf_prog_test_run(bpf_program__fd(skel->progs.test_prog), + 1, &pkt_v4, sizeof(pkt_v4), NULL, NULL, + &retval, &duration); + if (CHECK(err || retval, "bpf_for_each helper test_prog", + "err %d errno %d retval %d\n", err, errno, retval)) + goto out; + ASSERT_EQ(skel->bss->nr_iterations_completed, skel->data->stop_index + 1, + "stop_index not followed"); + ASSERT_EQ(skel->bss->g_output, (50 * 49) / 2, "wrong output"); + + /* test passing in a null ctx */ + skel->bss->nr_iterations = 10; + err = bpf_prog_test_run(bpf_program__fd(skel->progs.prog_null_ctx), + 1, &pkt_v4, sizeof(pkt_v4), NULL, NULL, + &retval, &duration); + if (CHECK(err || retval, "bpf_for_each helper prog_null_ctx", + "err %d errno %d retval %d\n", err, errno, retval)) + goto out; + ASSERT_EQ(skel->bss->nr_iterations_completed, skel->bss->nr_iterations, + "nr_iterations mismatch"); + + /* test invalid flags */ + err = bpf_prog_test_run(bpf_program__fd(skel->progs.prog_invalid_flags), + 1, &pkt_v4, sizeof(pkt_v4), NULL, NULL, + &retval, &duration); + if (CHECK(err || retval, "bpf_for_each helper prog_invalid_flags", + "err %d errno %d retval %d\n", err, errno, retval)) + goto out; + ASSERT_EQ(skel->bss->err, -EINVAL, "invalid_flags"); + +out: + for_each_helper__destroy(skel); +} + void test_for_each(void) { if (test__start_subtest("hash_map")) test_hash_map(); if (test__start_subtest("array_map")) test_array_map(); + if (test__start_subtest("for_each_helper")) + test_for_each_helper(); } diff --git a/tools/testing/selftests/bpf/progs/for_each_helper.c b/tools/testing/selftests/bpf/progs/for_each_helper.c new file mode 100644 index 000000000000..4404d0cb32a6 --- /dev/null +++ b/tools/testing/selftests/bpf/progs/for_each_helper.c @@ -0,0 +1,69 @@ +// SPDX-License-Identifier: GPL-2.0 +/* Copyright (c) 2021 Facebook */ + +#include "vmlinux.h" +#include <bpf/bpf_helpers.h> + +char _license[] SEC("license") = "GPL"; + +struct callback_ctx { + int output; +}; + +/* This should be set by the user program */ +u32 nr_iterations; +u32 stop_index = -1; + +/* Making these global variables so that the userspace program + * can verify the output through the skeleton + */ +int nr_iterations_completed; +int g_output; +int err; + +static int callback_fn(__u32 index, void *data) +{ + struct callback_ctx *ctx = data; + + if (index >= stop_index) + return 1; + + ctx->output += index; + + return 0; +} + +static int empty_callback_fn(__u32 index, void *data) +{ + return 0; +} + +SEC("tc") +int test_prog(struct __sk_buff *skb) +{ + struct callback_ctx data = {}; + + nr_iterations_completed = bpf_for_each(nr_iterations, callback_fn, &data, 0); + + g_output = data.output; + + return 0; +} + +SEC("tc") +int prog_null_ctx(struct __sk_buff *skb) +{ + nr_iterations_completed = bpf_for_each(nr_iterations, empty_callback_fn, NULL, 0); + + return 0; +} + +SEC("tc") +int prog_invalid_flags(struct __sk_buff *skb) +{ + struct callback_ctx data = {}; + + err = bpf_for_each(nr_iterations, callback_fn, &data, 1); + + return 0; +} diff --git a/tools/testing/selftests/bpf/progs/pyperf.h b/tools/testing/selftests/bpf/progs/pyperf.h index 2fb7adafb6b6..186735e2f385 100644 --- a/tools/testing/selftests/bpf/progs/pyperf.h +++ b/tools/testing/selftests/bpf/progs/pyperf.h @@ -159,6 +159,57 @@ struct { __uint(value_size, sizeof(long long) * 127); } stackmap SEC(".maps"); +struct process_frame_ctx { + int cur_cpu; + int32_t *symbol_counter; + void *frame_ptr; + FrameData *frame; + PidData *pidData; + Symbol *sym; + Event *event; + bool done; +}; + +#define barrier_var(var) asm volatile("" : "=r"(var) : "0"(var)) + +static int process_frame_callback(__u32 i, struct process_frame_ctx *ctx) +{ + int zero = 0; + void *frame_ptr = ctx->frame_ptr; + PidData *pidData = ctx->pidData; + FrameData *frame = ctx->frame; + int32_t *symbol_counter = ctx->symbol_counter; + int cur_cpu = ctx->cur_cpu; + Event *event = ctx->event; + Symbol *sym = ctx->sym; + + if (frame_ptr && get_frame_data(frame_ptr, pidData, frame, sym)) { + int32_t new_symbol_id = *symbol_counter * 64 + cur_cpu; + int32_t *symbol_id = bpf_map_lookup_elem(&symbolmap, sym); + + if (!symbol_id) { + bpf_map_update_elem(&symbolmap, sym, &zero, 0); + symbol_id = bpf_map_lookup_elem(&symbolmap, sym); + if (!symbol_id) { + ctx->done = true; + return 1; + } + } + if (*symbol_id == new_symbol_id) + (*symbol_counter)++; + + barrier_var(i); + if (i >= STACK_MAX_LEN) + return 1; + + event->stack[i] = *symbol_id; + + event->stack_len = i + 1; + frame_ptr = frame->f_back; + } + return 0; +} + #ifdef GLOBAL_FUNC __noinline #elif defined(SUBPROGS) @@ -228,11 +279,27 @@ int __on_event(struct bpf_raw_tracepoint_args *ctx) int32_t* symbol_counter = bpf_map_lookup_elem(&symbolmap, &sym); if (symbol_counter == NULL) return 0; +#ifdef USE_FOREACH + struct process_frame_ctx ctx; + + ctx.cur_cpu = cur_cpu; + ctx.symbol_counter = symbol_counter; + ctx.frame_ptr = frame_ptr; + ctx.frame = &frame; + ctx.pidData = pidData; + ctx.sym = &sym; + ctx.event = event; + ctx.done = false; + + bpf_for_each(STACK_MAX_LEN, process_frame_callback, &ctx, 0); + if (ctx.done) + return 0; +#else #ifdef NO_UNROLL #pragma clang loop unroll(disable) #else #pragma clang loop unroll(full) -#endif +#endif /* NO_UNROLL */ /* Unwind python stack */ for (int i = 0; i < STACK_MAX_LEN; ++i) { if (frame_ptr && get_frame_data(frame_ptr, pidData, &frame, &sym)) { @@ -251,6 +318,7 @@ int __on_event(struct bpf_raw_tracepoint_args *ctx) frame_ptr = frame.f_back; } } +#endif /* USE_FOREACH */ event->stack_complete = frame_ptr == NULL; } else { event->stack_complete = 1; diff --git a/tools/testing/selftests/bpf/progs/pyperf600_foreach.c b/tools/testing/selftests/bpf/progs/pyperf600_foreach.c new file mode 100644 index 000000000000..1b43f12a7d54 --- /dev/null +++ b/tools/testing/selftests/bpf/progs/pyperf600_foreach.c @@ -0,0 +1,5 @@ +// SPDX-License-Identifier: GPL-2.0 +// Copyright (c) 2021 Facebook +#define STACK_MAX_LEN 600 +#define USE_FOREACH +#include "pyperf.h" diff --git a/tools/testing/selftests/bpf/progs/strobemeta.h b/tools/testing/selftests/bpf/progs/strobemeta.h index 7de534f38c3f..40069e797930 100644 --- a/tools/testing/selftests/bpf/progs/strobemeta.h +++ b/tools/testing/selftests/bpf/progs/strobemeta.h @@ -445,6 +445,46 @@ static __always_inline void *read_map_var(struct strobemeta_cfg *cfg, return payload; } +enum read_type { + READ_INT_VAR, + READ_MAP_VAR, + READ_STR_VAR, +}; + +struct read_var_ctx { + struct strobemeta_payload *data; + void *tls_base; + struct strobemeta_cfg *cfg; + void *payload; + /* value gets mutated */ + struct strobe_value_generic *value; + enum read_type type; +}; + +static int read_var_callback(__u32 index, struct read_var_ctx *ctx) +{ + switch (ctx->type) { + case READ_INT_VAR: + if (index >= STROBE_MAX_INTS) + return 1; + read_int_var(ctx->cfg, index, ctx->tls_base, ctx->value, ctx->data); + break; + case READ_MAP_VAR: + if (index >= STROBE_MAX_MAPS) + return 1; + ctx->payload = read_map_var(ctx->cfg, index, ctx->tls_base, + ctx->value, ctx->data, ctx->payload); + break; + case READ_STR_VAR: + if (index >= STROBE_MAX_STRS) + return 1; + ctx->payload += read_str_var(ctx->cfg, index, ctx->tls_base, + ctx->value, ctx->data, ctx->payload); + break; + } + return 0; +} + /* * read_strobe_meta returns NULL, if no metadata was read; otherwise returns * pointer to *right after* payload ends @@ -475,11 +515,36 @@ static void *read_strobe_meta(struct task_struct *task, */ tls_base = (void *)task; +#ifdef USE_FOREACH + struct read_var_ctx ctx; + int err; + + ctx.cfg = cfg; + ctx.tls_base = tls_base; + ctx.value = &value; + ctx.data = data; + ctx.payload = payload; + ctx.type = READ_INT_VAR; + + err = bpf_for_each(STROBE_MAX_INTS, read_var_callback, &ctx, 0); + if (err != STROBE_MAX_INTS) + return NULL; + + ctx.type = READ_STR_VAR; + err = bpf_for_each(STROBE_MAX_STRS, read_var_callback, &ctx, 0); + if (err != STROBE_MAX_STRS) + return NULL; + + ctx.type = READ_MAP_VAR; + err = bpf_for_each(STROBE_MAX_MAPS, read_var_callback, &ctx, 0); + if (err != STROBE_MAX_MAPS) + return NULL; +#else #ifdef NO_UNROLL #pragma clang loop unroll(disable) #else #pragma unroll -#endif +#endif /* NO_UNROLL */ for (int i = 0; i < STROBE_MAX_INTS; ++i) { read_int_var(cfg, i, tls_base, &value, data); } @@ -487,7 +552,7 @@ static void *read_strobe_meta(struct task_struct *task, #pragma clang loop unroll(disable) #else #pragma unroll -#endif +#endif /* NO_UNROLL */ for (int i = 0; i < STROBE_MAX_STRS; ++i) { payload += read_str_var(cfg, i, tls_base, &value, data, payload); } @@ -495,10 +560,12 @@ static void *read_strobe_meta(struct task_struct *task, #pragma clang loop unroll(disable) #else #pragma unroll -#endif +#endif /* NO_UNROLL */ for (int i = 0; i < STROBE_MAX_MAPS; ++i) { payload = read_map_var(cfg, i, tls_base, &value, data, payload); } +#endif /* USE_FOREACH */ + /* * return pointer right after end of payload, so it's possible to * calculate exact amount of useful data that needs to be sent diff --git a/tools/testing/selftests/bpf/progs/strobemeta_foreach.c b/tools/testing/selftests/bpf/progs/strobemeta_foreach.c new file mode 100644 index 000000000000..a2d57d2d68ad --- /dev/null +++ b/tools/testing/selftests/bpf/progs/strobemeta_foreach.c @@ -0,0 +1,9 @@ +// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) +// Copyright (c) 2021 Facebook + +#define STROBE_MAX_INTS 2 +#define STROBE_MAX_STRS 25 +#define STROBE_MAX_MAPS 100 +#define STROBE_MAX_MAP_ENTRIES 20 +#define USE_FOREACH +#include "strobemeta.h"
In this patch - 1) Add a new prog "for_each_helper" which tests the basic functionality of the bpf_for_each helper. 2) Add pyperf600_foreach and strobemeta_foreach to test the performance of using bpf_for_each instead of a for loop The results of pyperf600 and strobemeta are as follows: ~strobemeta~ Baseline verification time 6808200 usec stack depth 496 processed 592132 insns (limit 1000000) max_states_per_insn 14 total_states 16018 peak_states 13684 mark_read 3132 #188 verif_scale_strobemeta:OK (unrolled loop) Using bpf_for_each verification time 31589 usec stack depth 96+408 processed 1630 insns (limit 1000000) max_states_per_insn 4 total_states 107 peak_states 107 mark_read 60 #189 verif_scale_strobemeta_foreach:OK ~pyperf600~ Baseline verification time 29702486 usec stack depth 368 processed 626838 insns (limit 1000000) max_states_per_insn 7 total_states 30368 peak_states 30279 mark_read 748 #182 verif_scale_pyperf600:OK (unrolled loop) Using bpf_for_each verification time 148488 usec stack depth 320+40 processed 10518 insns (limit 1000000) max_states_per_insn 10 total_states 705 peak_states 517 mark_read 38 #183 verif_scale_pyperf600_foreach:OK Using the bpf_for_each helper led to approximately a 100% decrease in the verification time and in the number of instructions. Signed-off-by: Joanne Koong <joannekoong@fb.com> --- .../bpf/prog_tests/bpf_verif_scale.c | 12 +++ .../selftests/bpf/prog_tests/for_each.c | 61 ++++++++++++++++ .../selftests/bpf/progs/for_each_helper.c | 69 ++++++++++++++++++ tools/testing/selftests/bpf/progs/pyperf.h | 70 +++++++++++++++++- .../selftests/bpf/progs/pyperf600_foreach.c | 5 ++ .../testing/selftests/bpf/progs/strobemeta.h | 73 ++++++++++++++++++- .../selftests/bpf/progs/strobemeta_foreach.c | 9 +++ 7 files changed, 295 insertions(+), 4 deletions(-) create mode 100644 tools/testing/selftests/bpf/progs/for_each_helper.c create mode 100644 tools/testing/selftests/bpf/progs/pyperf600_foreach.c create mode 100644 tools/testing/selftests/bpf/progs/strobemeta_foreach.c