mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-08-05 16:54:27 +00:00

The selftests build four kernel modules which use copy-pasted Makefile targets. This is a bit messy, and doesn't scale so well when we add more modules, so let's consolidate these rules into a single rule generated for each module name, and move the module sources into a single directory. To avoid parallel builds of the different modules stepping on each other's toes during the 'modpost' phase of the Kbuild 'make modules', the module files should really be a grouped target. However, make only added explicit support for grouped targets in version 4.3, which is newer than the minimum version supported by the kernel. However, make implicitly treats pattern matching rules with multiple targets as a grouped target, so we can work around this by turning the rule into a pattern matching target. We do this by replacing '.ko' with '%ko' in the targets with subst(). Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com> Signed-off-by: Andrii Nakryiko <andrii@kernel.org> Acked-by: Viktor Malik <vmalik@redhat.com> Link: https://lore.kernel.org/bpf/20241204-bpf-selftests-mod-compile-v5-1-b96231134a49@redhat.com
65 lines
1.1 KiB
C
65 lines
1.1 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Copyright (c) 2024 Google LLC */
|
|
#include <vmlinux.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
#include "../test_kmods/bpf_testmod_kfunc.h"
|
|
|
|
SEC("syscall")
|
|
int init_sock(struct init_sock_args *args)
|
|
{
|
|
bpf_kfunc_init_sock(args);
|
|
|
|
return 0;
|
|
}
|
|
|
|
SEC("syscall")
|
|
int close_sock(void *ctx)
|
|
{
|
|
bpf_kfunc_close_sock();
|
|
|
|
return 0;
|
|
}
|
|
|
|
SEC("syscall")
|
|
int kernel_connect(struct addr_args *args)
|
|
{
|
|
return bpf_kfunc_call_kernel_connect(args);
|
|
}
|
|
|
|
SEC("syscall")
|
|
int kernel_bind(struct addr_args *args)
|
|
{
|
|
return bpf_kfunc_call_kernel_bind(args);
|
|
}
|
|
|
|
SEC("syscall")
|
|
int kernel_listen(struct addr_args *args)
|
|
{
|
|
return bpf_kfunc_call_kernel_listen();
|
|
}
|
|
|
|
SEC("syscall")
|
|
int kernel_sendmsg(struct sendmsg_args *args)
|
|
{
|
|
return bpf_kfunc_call_kernel_sendmsg(args);
|
|
}
|
|
|
|
SEC("syscall")
|
|
int sock_sendmsg(struct sendmsg_args *args)
|
|
{
|
|
return bpf_kfunc_call_sock_sendmsg(args);
|
|
}
|
|
|
|
SEC("syscall")
|
|
int kernel_getsockname(struct addr_args *args)
|
|
{
|
|
return bpf_kfunc_call_kernel_getsockname(args);
|
|
}
|
|
|
|
SEC("syscall")
|
|
int kernel_getpeername(struct addr_args *args)
|
|
{
|
|
return bpf_kfunc_call_kernel_getpeername(args);
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|