Add several BPF kselftest cases for tail calls which test the various patch directions, and that multiple locations are patched in same and different programs. # ./test_progs -n 45 #45/1 tailcall_1:OK #45/2 tailcall_2:OK #45/3 tailcall_3:OK #45/4 tailcall_4:OK #45/5 tailcall_5:OK #45 tailcalls:OK Summary: 1/5 PASSED, 0 SKIPPED, 0 FAILED I've also verified the JITed dump after each of the rewrite cases that it matches expectations. Also regular test_verifier suite passes fine which contains further tail call tests: # ./test_verifier [...] Summary: 1563 PASSED, 0 SKIPPED, 0 FAILED Checked under JIT, interpreter and JIT + hardening. Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Acked-by: Andrii Nakryiko <andriin@fb.com> Link: https://lore.kernel.org/bpf/3d6cbecbeb171117dccfe153306e479798fb608d.1574452833.git.daniel@iogearbox.net
60 lines
1.1 KiB
C
60 lines
1.1 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
#include <linux/bpf.h>
|
|
|
|
#include "bpf_helpers.h"
|
|
|
|
struct {
|
|
__uint(type, BPF_MAP_TYPE_PROG_ARRAY);
|
|
__uint(max_entries, 5);
|
|
__uint(key_size, sizeof(__u32));
|
|
__uint(value_size, sizeof(__u32));
|
|
} jmp_table SEC(".maps");
|
|
|
|
SEC("classifier/0")
|
|
int bpf_func_0(struct __sk_buff *skb)
|
|
{
|
|
bpf_tail_call(skb, &jmp_table, 1);
|
|
return 0;
|
|
}
|
|
|
|
SEC("classifier/1")
|
|
int bpf_func_1(struct __sk_buff *skb)
|
|
{
|
|
bpf_tail_call(skb, &jmp_table, 2);
|
|
return 1;
|
|
}
|
|
|
|
SEC("classifier/2")
|
|
int bpf_func_2(struct __sk_buff *skb)
|
|
{
|
|
return 2;
|
|
}
|
|
|
|
SEC("classifier/3")
|
|
int bpf_func_3(struct __sk_buff *skb)
|
|
{
|
|
bpf_tail_call(skb, &jmp_table, 4);
|
|
return 3;
|
|
}
|
|
|
|
SEC("classifier/4")
|
|
int bpf_func_4(struct __sk_buff *skb)
|
|
{
|
|
bpf_tail_call(skb, &jmp_table, 3);
|
|
return 4;
|
|
}
|
|
|
|
SEC("classifier")
|
|
int entry(struct __sk_buff *skb)
|
|
{
|
|
bpf_tail_call(skb, &jmp_table, 0);
|
|
/* Check multi-prog update. */
|
|
bpf_tail_call(skb, &jmp_table, 2);
|
|
/* Check tail call limit. */
|
|
bpf_tail_call(skb, &jmp_table, 3);
|
|
return 3;
|
|
}
|
|
|
|
char __license[] SEC("license") = "GPL";
|
|
int _version SEC("version") = 1;
|