2018-11-21 12:55:57 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
/* Copyright (c) 2018 Facebook */
|
|
|
|
#include <stddef.h>
|
|
|
|
#include <linux/bpf.h>
|
|
|
|
#include <linux/types.h>
|
2020-01-20 21:06:45 +08:00
|
|
|
#include <bpf/bpf_helpers.h>
|
2018-11-21 12:55:57 +08:00
|
|
|
|
2019-07-05 23:50:12 +08:00
|
|
|
struct {
|
|
|
|
__uint(type, BPF_MAP_TYPE_ARRAY_OF_MAPS);
|
|
|
|
__uint(max_entries, 1);
|
|
|
|
__uint(map_flags, 0);
|
|
|
|
__uint(key_size, sizeof(__u32));
|
2018-11-21 12:55:57 +08:00
|
|
|
/* must be sizeof(__u32) for map in map */
|
2019-07-05 23:50:12 +08:00
|
|
|
__uint(value_size, sizeof(__u32));
|
|
|
|
} mim_array SEC(".maps");
|
|
|
|
|
|
|
|
struct {
|
|
|
|
__uint(type, BPF_MAP_TYPE_HASH_OF_MAPS);
|
|
|
|
__uint(max_entries, 1);
|
|
|
|
__uint(map_flags, 0);
|
|
|
|
__uint(key_size, sizeof(int));
|
2018-11-21 12:55:57 +08:00
|
|
|
/* must be sizeof(__u32) for map in map */
|
2019-07-05 23:50:12 +08:00
|
|
|
__uint(value_size, sizeof(__u32));
|
|
|
|
} mim_hash SEC(".maps");
|
2018-11-21 12:55:57 +08:00
|
|
|
|
|
|
|
SEC("xdp_mimtest")
|
|
|
|
int xdp_mimtest0(struct xdp_md *ctx)
|
|
|
|
{
|
|
|
|
int value = 123;
|
tools/bpf: selftests: add map lookup to test_map_in_map bpf prog
The bpf_map_lookup_elem is added in the bpf program.
Without previous patch, the test change will trigger the
following error:
$ ./test_maps
...
; value_p = bpf_map_lookup_elem(map, &key);
20: (bf) r1 = r7
21: (bf) r2 = r8
22: (85) call bpf_map_lookup_elem#1
; if (!value_p || *value_p != 123)
23: (15) if r0 == 0x0 goto pc+16
R0=map_value(id=2,off=0,ks=4,vs=4,imm=0) R6=inv1 R7=map_ptr(id=0,off=0,ks=4,vs=4,imm=0)
R8=fp-8,call_-1 R10=fp0,call_-1 fp-8=mmmmmmmm
; if (!value_p || *value_p != 123)
24: (61) r1 = *(u32 *)(r0 +0)
R0=map_value(id=2,off=0,ks=4,vs=4,imm=0) R6=inv1 R7=map_ptr(id=0,off=0,ks=4,vs=4,imm=0)
R8=fp-8,call_-1 R10=fp0,call_-1 fp-8=mmmmmmmm
bpf_spin_lock cannot be accessed directly by load/store
With the kernel fix in the previous commit, the error goes away.
Signed-off-by: Yonghong Song <yhs@fb.com>
Acked-by: Andrii Nakryiko <andriin@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2019-02-28 05:22:57 +08:00
|
|
|
int *value_p;
|
2018-11-21 12:55:57 +08:00
|
|
|
int key = 0;
|
|
|
|
void *map;
|
|
|
|
|
|
|
|
map = bpf_map_lookup_elem(&mim_array, &key);
|
|
|
|
if (!map)
|
|
|
|
return XDP_DROP;
|
|
|
|
|
|
|
|
bpf_map_update_elem(map, &key, &value, 0);
|
tools/bpf: selftests: add map lookup to test_map_in_map bpf prog
The bpf_map_lookup_elem is added in the bpf program.
Without previous patch, the test change will trigger the
following error:
$ ./test_maps
...
; value_p = bpf_map_lookup_elem(map, &key);
20: (bf) r1 = r7
21: (bf) r2 = r8
22: (85) call bpf_map_lookup_elem#1
; if (!value_p || *value_p != 123)
23: (15) if r0 == 0x0 goto pc+16
R0=map_value(id=2,off=0,ks=4,vs=4,imm=0) R6=inv1 R7=map_ptr(id=0,off=0,ks=4,vs=4,imm=0)
R8=fp-8,call_-1 R10=fp0,call_-1 fp-8=mmmmmmmm
; if (!value_p || *value_p != 123)
24: (61) r1 = *(u32 *)(r0 +0)
R0=map_value(id=2,off=0,ks=4,vs=4,imm=0) R6=inv1 R7=map_ptr(id=0,off=0,ks=4,vs=4,imm=0)
R8=fp-8,call_-1 R10=fp0,call_-1 fp-8=mmmmmmmm
bpf_spin_lock cannot be accessed directly by load/store
With the kernel fix in the previous commit, the error goes away.
Signed-off-by: Yonghong Song <yhs@fb.com>
Acked-by: Andrii Nakryiko <andriin@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2019-02-28 05:22:57 +08:00
|
|
|
value_p = bpf_map_lookup_elem(map, &key);
|
|
|
|
if (!value_p || *value_p != 123)
|
|
|
|
return XDP_DROP;
|
2018-11-21 12:55:57 +08:00
|
|
|
|
|
|
|
map = bpf_map_lookup_elem(&mim_hash, &key);
|
|
|
|
if (!map)
|
|
|
|
return XDP_DROP;
|
|
|
|
|
|
|
|
bpf_map_update_elem(map, &key, &value, 0);
|
|
|
|
|
|
|
|
return XDP_PASS;
|
|
|
|
}
|
|
|
|
|
|
|
|
int _version SEC("version") = 1;
|
|
|
|
char _license[] SEC("license") = "GPL";
|