mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-21 14:38:02 +07:00
82a8616889
Add map tests to attach BPF_PROG_TYPE_SK_MSG types to a sockmap. Signed-off-by: John Fastabend <john.fastabend@gmail.com> Acked-by: David S. Miller <davem@davemloft.net> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
47 lines
1.0 KiB
C
47 lines
1.0 KiB
C
#include <linux/bpf.h>
|
|
#include "bpf_helpers.h"
|
|
#include "bpf_util.h"
|
|
#include "bpf_endian.h"
|
|
|
|
int _version SEC("version") = 1;
|
|
|
|
#define bpf_printk(fmt, ...) \
|
|
({ \
|
|
char ____fmt[] = fmt; \
|
|
bpf_trace_printk(____fmt, sizeof(____fmt), \
|
|
##__VA_ARGS__); \
|
|
})
|
|
|
|
SEC("sk_skb1")
|
|
int bpf_prog1(struct __sk_buff *skb)
|
|
{
|
|
void *data_end = (void *)(long) skb->data_end;
|
|
void *data = (void *)(long) skb->data;
|
|
__u32 lport = skb->local_port;
|
|
__u32 rport = skb->remote_port;
|
|
__u8 *d = data;
|
|
__u32 len = (__u32) data_end - (__u32) data;
|
|
int err;
|
|
|
|
if (data + 10 > data_end) {
|
|
err = bpf_skb_pull_data(skb, 10);
|
|
if (err)
|
|
return SK_DROP;
|
|
|
|
data_end = (void *)(long)skb->data_end;
|
|
data = (void *)(long)skb->data;
|
|
if (data + 10 > data_end)
|
|
return SK_DROP;
|
|
}
|
|
|
|
/* This write/read is a bit pointless but tests the verifier and
|
|
* strparser handler for read/write pkt data and access into sk
|
|
* fields.
|
|
*/
|
|
d = data;
|
|
d[7] = 1;
|
|
return skb->len;
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|