diff options
| author | Paul Chaignon <paul.chaignon@gmail.com> | 2023-11-06 10:17:24 +0100 |
|---|---|---|
| committer | Aleksandr Nogikh <nogikh@google.com> | 2023-11-06 18:08:10 +0000 |
| commit | 8321139737ed27c82617231b782e88dd1e818227 (patch) | |
| tree | 5ea9811e07ff388dd4cb64553f083191963f7caf /executor/android/android_seccomp.h | |
| parent | b1547b1e6ffceaa58562db48077ea5588372eacd (diff) | |
sys/linux/test: test case for bpf_tail_call helper
This test case corresponds to the BPF program below (bcc syntax for the
map).
BPF_PROG_ARRAY(prog_array, 10);
int tail_call_prog(void *ctx) {
char str[8] = {0};
u64 data = 0x1234;
bpf_snprintf(str, sizeof(str), "%d ", &data, sizeof(data));
return 0;
}
int do_tail_call(void *ctx) {
prog_array.call(ctx, 0);
return 0;
}
It reuses the program defined to test bpf_snprintf, as the target of the
tail call.
Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
Diffstat (limited to 'executor/android/android_seccomp.h')
0 files changed, 0 insertions, 0 deletions
