blob: 1a30426c3138ce283a00a5292b825990a6c6152d [file] [log] [blame]
Daniel Borkmann41d6e332015-12-02 00:25:36 +01001#include "../../include/bpf_api.h"
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +01002
3#define ENTRY_INIT 3
4#define ENTRY_0 0
5#define ENTRY_1 1
6#define MAX_JMP_SIZE 2
7
8#define FOO 42
9#define BAR 43
10
11/* This example doesn't really do anything useful, but it's purpose is to
12 * demonstrate eBPF tail calls on a very simple example.
13 *
14 * cls_entry() is our classifier entry point, from there we jump based on
15 * skb->hash into cls_case1() or cls_case2(). They are both part of the
16 * program array jmp_tc. Indicated via __section_tail(), the tc loader
17 * populates the program arrays with the loaded file descriptors already.
18 *
19 * To demonstrate nested jumps, cls_case2() jumps within the same jmp_tc
20 * array to cls_case1(). And whenever we arrive at cls_case1(), we jump
21 * into cls_exit(), part of the jump array jmp_ex.
22 *
23 * Also, to show it's possible, all programs share map_sh and dump the value
24 * that the entry point incremented. The sections that are loaded into a
25 * program array can be atomically replaced during run-time, e.g. to change
26 * classifier behaviour.
27 */
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010028
Daniel Borkmann4dd3f502016-04-09 00:32:05 +020029struct bpf_elf_map __section_maps jmp_tc = {
30 .type = BPF_MAP_TYPE_PROG_ARRAY,
31 .id = FOO,
32 .size_key = sizeof(uint32_t),
33 .size_value = sizeof(uint32_t),
34 .pinning = PIN_OBJECT_NS,
35 .max_elem = MAX_JMP_SIZE,
36};
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010037
Daniel Borkmann4dd3f502016-04-09 00:32:05 +020038struct bpf_elf_map __section_maps jmp_ex = {
39 .type = BPF_MAP_TYPE_PROG_ARRAY,
40 .id = BAR,
41 .size_key = sizeof(uint32_t),
42 .size_value = sizeof(uint32_t),
43 .pinning = PIN_OBJECT_NS,
44 .max_elem = 1,
45};
46
47struct bpf_elf_map __section_maps map_sh = {
48 .type = BPF_MAP_TYPE_ARRAY,
49 .size_key = sizeof(uint32_t),
50 .size_value = sizeof(uint32_t),
51 .pinning = PIN_OBJECT_NS,
52 .max_elem = 1,
53};
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010054
Daniel Borkmann41d6e332015-12-02 00:25:36 +010055__section_tail(FOO, ENTRY_0)
56int cls_case1(struct __sk_buff *skb)
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010057{
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010058 int key = 0, *val;
59
Daniel Borkmann41d6e332015-12-02 00:25:36 +010060 val = map_lookup_elem(&map_sh, &key);
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010061 if (val)
Daniel Borkmann92a36992016-02-07 02:11:50 +010062 printt("case1: map-val: %d from:%u\n", *val, skb->cb[0]);
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010063
64 skb->cb[0] = ENTRY_0;
Daniel Borkmann41d6e332015-12-02 00:25:36 +010065 tail_call(skb, &jmp_ex, ENTRY_0);
66
67 return BPF_H_DEFAULT;
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010068}
69
Daniel Borkmann41d6e332015-12-02 00:25:36 +010070__section_tail(FOO, ENTRY_1)
71int cls_case2(struct __sk_buff *skb)
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010072{
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010073 int key = 0, *val;
74
Daniel Borkmann41d6e332015-12-02 00:25:36 +010075 val = map_lookup_elem(&map_sh, &key);
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010076 if (val)
Daniel Borkmann92a36992016-02-07 02:11:50 +010077 printt("case2: map-val: %d from:%u\n", *val, skb->cb[0]);
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010078
79 skb->cb[0] = ENTRY_1;
Daniel Borkmann41d6e332015-12-02 00:25:36 +010080 tail_call(skb, &jmp_tc, ENTRY_0);
81
82 return BPF_H_DEFAULT;
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010083}
84
Daniel Borkmann41d6e332015-12-02 00:25:36 +010085__section_tail(BAR, ENTRY_0)
86int cls_exit(struct __sk_buff *skb)
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010087{
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010088 int key = 0, *val;
89
Daniel Borkmann41d6e332015-12-02 00:25:36 +010090 val = map_lookup_elem(&map_sh, &key);
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010091 if (val)
Daniel Borkmann92a36992016-02-07 02:11:50 +010092 printt("exit: map-val: %d from:%u\n", *val, skb->cb[0]);
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010093
94 /* Termination point. */
Daniel Borkmann41d6e332015-12-02 00:25:36 +010095 return BPF_H_DEFAULT;
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +010096}
97
Daniel Borkmann41d6e332015-12-02 00:25:36 +010098__section_cls_entry
99int cls_entry(struct __sk_buff *skb)
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +0100100{
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +0100101 int key = 0, *val;
102
103 /* For transferring state, we can use skb->cb[0] ... skb->cb[4]. */
Daniel Borkmann41d6e332015-12-02 00:25:36 +0100104 val = map_lookup_elem(&map_sh, &key);
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +0100105 if (val) {
Daniel Borkmann41d6e332015-12-02 00:25:36 +0100106 lock_xadd(val, 1);
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +0100107
108 skb->cb[0] = ENTRY_INIT;
Daniel Borkmann41d6e332015-12-02 00:25:36 +0100109 tail_call(skb, &jmp_tc, skb->hash & (MAX_JMP_SIZE - 1));
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +0100110 }
111
Daniel Borkmann92a36992016-02-07 02:11:50 +0100112 printt("fallthrough\n");
Daniel Borkmann41d6e332015-12-02 00:25:36 +0100113 return BPF_H_DEFAULT;
Daniel Borkmann0b7e3fc2015-11-26 15:38:46 +0100114}
115
Daniel Borkmann41d6e332015-12-02 00:25:36 +0100116BPF_LICENSE("GPL");