This series enables fentry on x86 BPF programs reached via tail calls
and adds a focused selftest for the expected behavior.
Patch 1 fixes the x86 mirrored text-poke lookup so the tail-call landing
slot is patched on both IBT and non-IBT JITs.
Patch 2 adds a selftest that checks both direct entry and tail-called
entry for a tailcall callee with fentry attached.
Takeru Hayasaka (2):
bpf, x86: patch tail-call fentry slot on non-IBT JITs
selftests/bpf: cover fentry on tailcalled programs
arch/x86/net/bpf_jit_comp.c | 47 +++++++-
.../selftests/bpf/prog_tests/tailcalls.c | 110 ++++++++++++++++++
.../bpf/progs/tailcall_fentry_probe.c | 16 +++
.../bpf/progs/tailcall_fentry_target.c | 27 +++++
4 files changed, 197 insertions(+), 3 deletions(-)
create mode 100644 tools/testing/selftests/bpf/progs/tailcall_fentry_probe.c
create mode 100644 tools/testing/selftests/bpf/progs/tailcall_fentry_target.c
--
2.43.0