mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-18 10:13:57 +08:00
5875cf4cd3
Cc: Adrian Hunter <adrian.hunter@intel.com> Cc: Andi Kleen <ak@linux.intel.com> Cc: Jiri Olsa <jolsa@kernel.org> Cc: Namhyung Kim <namhyung@kernel.org> Cc: Wang Nan <wangnan0@huawei.com> Link: https://lkml.kernel.org/n/tip-p0kg493z2m8qizjbdefzip1i@git.kernel.org Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
52 lines
1.3 KiB
C
52 lines
1.3 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* bpf-script-test-relocation.c
|
|
* Test BPF loader checking relocation
|
|
*/
|
|
#ifndef LINUX_VERSION_CODE
|
|
# error Need LINUX_VERSION_CODE
|
|
# error Example: for 4.2 kernel, put 'clang-opt="-DLINUX_VERSION_CODE=0x40200" into llvm section of ~/.perfconfig'
|
|
#endif
|
|
#define BPF_ANY 0
|
|
#define BPF_MAP_TYPE_ARRAY 2
|
|
#define BPF_FUNC_map_lookup_elem 1
|
|
#define BPF_FUNC_map_update_elem 2
|
|
|
|
static void *(*bpf_map_lookup_elem)(void *map, void *key) =
|
|
(void *) BPF_FUNC_map_lookup_elem;
|
|
static void *(*bpf_map_update_elem)(void *map, void *key, void *value, int flags) =
|
|
(void *) BPF_FUNC_map_update_elem;
|
|
|
|
struct bpf_map_def {
|
|
unsigned int type;
|
|
unsigned int key_size;
|
|
unsigned int value_size;
|
|
unsigned int max_entries;
|
|
};
|
|
|
|
#define SEC(NAME) __attribute__((section(NAME), used))
|
|
struct bpf_map_def SEC("maps") my_table = {
|
|
.type = BPF_MAP_TYPE_ARRAY,
|
|
.key_size = sizeof(int),
|
|
.value_size = sizeof(int),
|
|
.max_entries = 1,
|
|
};
|
|
|
|
int this_is_a_global_val;
|
|
|
|
SEC("func=sys_write")
|
|
int bpf_func__sys_write(void *ctx)
|
|
{
|
|
int key = 0;
|
|
int value = 0;
|
|
|
|
/*
|
|
* Incorrect relocation. Should not allow this program be
|
|
* loaded into kernel.
|
|
*/
|
|
bpf_map_update_elem(&this_is_a_global_val, &key, &value, 0);
|
|
return 0;
|
|
}
|
|
char _license[] SEC("license") = "GPL";
|
|
int _version SEC("version") = LINUX_VERSION_CODE;
|