mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2025-01-10 07:44:23 +08:00
3b03791111
Add four tests to tailcalls selftest explicitly named "tailcall_bpf2bpf_X" as their purpose is to validate that combination of tailcalls with bpf2bpf calls are working properly. These tests also validate LD_ABS from subprograms. Signed-off-by: Maciej Fijalkowski <maciej.fijalkowski@intel.com> Signed-off-by: Alexei Starovoitov <ast@kernel.org>
62 lines
1.1 KiB
C
62 lines
1.1 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
#include <linux/bpf.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
#include "bpf_legacy.h"
|
|
|
|
struct {
|
|
__uint(type, BPF_MAP_TYPE_PROG_ARRAY);
|
|
__uint(max_entries, 2);
|
|
__uint(key_size, sizeof(__u32));
|
|
__uint(value_size, sizeof(__u32));
|
|
} jmp_table SEC(".maps");
|
|
|
|
__noinline
|
|
int subprog_tail2(struct __sk_buff *skb)
|
|
{
|
|
volatile char arr[64] = {};
|
|
|
|
if (load_word(skb, 0) || load_half(skb, 0))
|
|
bpf_tail_call(skb, &jmp_table, 10);
|
|
else
|
|
bpf_tail_call(skb, &jmp_table, 1);
|
|
|
|
return skb->len;
|
|
}
|
|
|
|
static __noinline
|
|
int subprog_tail(struct __sk_buff *skb)
|
|
{
|
|
volatile char arr[64] = {};
|
|
|
|
bpf_tail_call(skb, &jmp_table, 0);
|
|
|
|
return skb->len * 2;
|
|
}
|
|
|
|
SEC("classifier/0")
|
|
int bpf_func_0(struct __sk_buff *skb)
|
|
{
|
|
volatile char arr[128] = {};
|
|
|
|
return subprog_tail2(skb);
|
|
}
|
|
|
|
SEC("classifier/1")
|
|
int bpf_func_1(struct __sk_buff *skb)
|
|
{
|
|
volatile char arr[128] = {};
|
|
|
|
return skb->len * 3;
|
|
}
|
|
|
|
SEC("classifier")
|
|
int entry(struct __sk_buff *skb)
|
|
{
|
|
volatile char arr[128] = {};
|
|
|
|
return subprog_tail(skb);
|
|
}
|
|
|
|
char __license[] SEC("license") = "GPL";
|
|
int _version SEC("version") = 1;
|