blob: 07113d4a0a4033ea22ce5295e0ca183bf841f5f3 [file] [log] [blame]
Daniel Borkmann41d6e332015-12-02 00:25:36 +01001#include "../../include/bpf_api.h"
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +01002
3/* This example demonstrates how classifier run-time behaviour
4 * can be altered with tail calls. We start out with an empty
5 * jmp_tc array, then add section aaa to the array slot 0, and
6 * later on atomically replace it with section bbb. Note that
7 * as shown in other examples, the tc loader can prepopulate
8 * tail called sections, here we start out with an empty one
9 * on purpose to show it can also be done this way.
10 *
11 * tc filter add dev foo parent ffff: bpf obj graft.o
12 * tc exec bpf dbg
13 * [...]
14 * Socket Thread-20229 [001] ..s. 138993.003923: : fallthrough
15 * <idle>-0 [001] ..s. 138993.202265: : fallthrough
16 * Socket Thread-20229 [001] ..s. 138994.004149: : fallthrough
17 * [...]
18 *
19 * tc exec bpf graft m:globals/jmp_tc key 0 obj graft.o sec aaa
20 * tc exec bpf dbg
21 * [...]
22 * Socket Thread-19818 [002] ..s. 139012.053587: : aaa
23 * <idle>-0 [002] ..s. 139012.172359: : aaa
24 * Socket Thread-19818 [001] ..s. 139012.173556: : aaa
25 * [...]
26 *
27 * tc exec bpf graft m:globals/jmp_tc key 0 obj graft.o sec bbb
28 * tc exec bpf dbg
29 * [...]
30 * Socket Thread-19818 [002] ..s. 139022.102967: : bbb
31 * <idle>-0 [002] ..s. 139022.155640: : bbb
32 * Socket Thread-19818 [001] ..s. 139022.156730: : bbb
33 * [...]
34 */
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010035
Daniel Borkmann4dd3f502016-04-09 00:32:05 +020036struct bpf_elf_map __section_maps jmp_tc = {
37 .type = BPF_MAP_TYPE_PROG_ARRAY,
38 .size_key = sizeof(uint32_t),
39 .size_value = sizeof(uint32_t),
40 .pinning = PIN_GLOBAL_NS,
41 .max_elem = 1,
42};
Daniel Borkmann41d6e332015-12-02 00:25:36 +010043
44__section("aaa")
45int cls_aaa(struct __sk_buff *skb)
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010046{
Daniel Borkmann92a36992016-02-07 02:11:50 +010047 printt("aaa\n");
Daniel Borkmann41d6e332015-12-02 00:25:36 +010048 return TC_H_MAKE(1, 42);
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010049}
50
Daniel Borkmann41d6e332015-12-02 00:25:36 +010051__section("bbb")
52int cls_bbb(struct __sk_buff *skb)
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010053{
Daniel Borkmann92a36992016-02-07 02:11:50 +010054 printt("bbb\n");
Daniel Borkmann41d6e332015-12-02 00:25:36 +010055 return TC_H_MAKE(1, 43);
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010056}
57
Daniel Borkmann41d6e332015-12-02 00:25:36 +010058__section_cls_entry
59int cls_entry(struct __sk_buff *skb)
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010060{
Daniel Borkmann41d6e332015-12-02 00:25:36 +010061 tail_call(skb, &jmp_tc, 0);
Daniel Borkmann92a36992016-02-07 02:11:50 +010062 printt("fallthrough\n");
Daniel Borkmann41d6e332015-12-02 00:25:36 +010063 return BPF_H_DEFAULT;
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010064}
65
Daniel Borkmann41d6e332015-12-02 00:25:36 +010066BPF_LICENSE("GPL");