mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-10-31 16:38:12 +00:00
256eab48e7
In preparation of skipping emitting static variables in BPF skeletons, switch all current selftests uses of static variables to pass data between BPF and user-space to use global variables. All non-read-only `static volatile` variables become just plain global variables by dropping `static volatile` part. Read-only `static volatile const` variables, though, still require `volatile` modifier, otherwise compiler will ignore whatever values are set from user-space. Few static linker tests are using name-conflicting static variables to validate that static linker still properly handles static variables and doesn't trip up on name conflicts. Signed-off-by: Andrii Nakryiko <andrii@kernel.org> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Link: https://lore.kernel.org/bpf/20210507054119.270888-4-andrii@kernel.org
41 lines
777 B
C
41 lines
777 B
C
// SPDX-License-Identifier: GPL-2.0
|
|
#include <linux/bpf.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
#include "bpf_legacy.h"
|
|
|
|
struct {
|
|
__uint(type, BPF_MAP_TYPE_PROG_ARRAY);
|
|
__uint(max_entries, 1);
|
|
__uint(key_size, sizeof(__u32));
|
|
__uint(value_size, sizeof(__u32));
|
|
} jmp_table SEC(".maps");
|
|
|
|
static __noinline
|
|
int subprog_tail(struct __sk_buff *skb)
|
|
{
|
|
if (load_byte(skb, 0))
|
|
bpf_tail_call_static(skb, &jmp_table, 1);
|
|
else
|
|
bpf_tail_call_static(skb, &jmp_table, 0);
|
|
return 1;
|
|
}
|
|
|
|
int count = 0;
|
|
|
|
SEC("classifier/0")
|
|
int bpf_func_0(struct __sk_buff *skb)
|
|
{
|
|
count++;
|
|
return subprog_tail(skb);
|
|
}
|
|
|
|
SEC("classifier")
|
|
int entry(struct __sk_buff *skb)
|
|
{
|
|
bpf_tail_call_static(skb, &jmp_table, 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
char __license[] SEC("license") = "GPL";
|
|
int _version SEC("version") = 1;
|