mirror of
git://git.yoctoproject.org/linux-yocto.git
synced 2025-10-22 23:13:01 +02:00

The selftests build four kernel modules which use copy-pasted Makefile targets. This is a bit messy, and doesn't scale so well when we add more modules, so let's consolidate these rules into a single rule generated for each module name, and move the module sources into a single directory. To avoid parallel builds of the different modules stepping on each other's toes during the 'modpost' phase of the Kbuild 'make modules', the module files should really be a grouped target. However, make only added explicit support for grouped targets in version 4.3, which is newer than the minimum version supported by the kernel. However, make implicitly treats pattern matching rules with multiple targets as a grouped target, so we can work around this by turning the rule into a pattern matching target. We do this by replacing '.ko' with '%ko' in the targets with subst(). Signed-off-by: Toke Høiland-Jørgensen <toke@redhat.com> Signed-off-by: Andrii Nakryiko <andrii@kernel.org> Acked-by: Viktor Malik <vmalik@redhat.com> Link: https://lore.kernel.org/bpf/20241204-bpf-selftests-mod-compile-v5-1-b96231134a49@redhat.com
143 lines
3.3 KiB
C
143 lines
3.3 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Copyright (c) 2020 Facebook */
|
|
|
|
#include "vmlinux.h"
|
|
#include <bpf/bpf_helpers.h>
|
|
#include <bpf/bpf_tracing.h>
|
|
#include <bpf/bpf_core_read.h>
|
|
#include "../test_kmods/bpf_testmod.h"
|
|
|
|
__u32 raw_tp_read_sz = 0;
|
|
|
|
SEC("raw_tp/bpf_testmod_test_read")
|
|
int BPF_PROG(handle_raw_tp,
|
|
struct task_struct *task, struct bpf_testmod_test_read_ctx *read_ctx)
|
|
{
|
|
raw_tp_read_sz = BPF_CORE_READ(read_ctx, len);
|
|
return 0;
|
|
}
|
|
|
|
__u32 raw_tp_bare_write_sz = 0;
|
|
|
|
SEC("raw_tp/bpf_testmod_test_write_bare")
|
|
int BPF_PROG(handle_raw_tp_bare,
|
|
struct task_struct *task, struct bpf_testmod_test_write_ctx *write_ctx)
|
|
{
|
|
raw_tp_bare_write_sz = BPF_CORE_READ(write_ctx, len);
|
|
return 0;
|
|
}
|
|
|
|
int raw_tp_writable_bare_in_val = 0;
|
|
int raw_tp_writable_bare_early_ret = 0;
|
|
int raw_tp_writable_bare_out_val = 0;
|
|
|
|
SEC("raw_tp.w/bpf_testmod_test_writable_bare")
|
|
int BPF_PROG(handle_raw_tp_writable_bare,
|
|
struct bpf_testmod_test_writable_ctx *writable)
|
|
{
|
|
raw_tp_writable_bare_in_val = writable->val;
|
|
writable->early_ret = raw_tp_writable_bare_early_ret;
|
|
writable->val = raw_tp_writable_bare_out_val;
|
|
return 0;
|
|
}
|
|
|
|
__u32 tp_btf_read_sz = 0;
|
|
|
|
SEC("tp_btf/bpf_testmod_test_read")
|
|
int BPF_PROG(handle_tp_btf,
|
|
struct task_struct *task, struct bpf_testmod_test_read_ctx *read_ctx)
|
|
{
|
|
tp_btf_read_sz = read_ctx->len;
|
|
return 0;
|
|
}
|
|
|
|
__u32 fentry_read_sz = 0;
|
|
|
|
SEC("fentry/bpf_testmod_test_read")
|
|
int BPF_PROG(handle_fentry,
|
|
struct file *file, struct kobject *kobj,
|
|
struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len)
|
|
{
|
|
fentry_read_sz = len;
|
|
return 0;
|
|
}
|
|
|
|
__u32 fentry_manual_read_sz = 0;
|
|
|
|
SEC("fentry")
|
|
int BPF_PROG(handle_fentry_manual,
|
|
struct file *file, struct kobject *kobj,
|
|
struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len)
|
|
{
|
|
fentry_manual_read_sz = len;
|
|
return 0;
|
|
}
|
|
|
|
__u32 fentry_explicit_read_sz = 0;
|
|
|
|
SEC("fentry/bpf_testmod:bpf_testmod_test_read")
|
|
int BPF_PROG(handle_fentry_explicit,
|
|
struct file *file, struct kobject *kobj,
|
|
struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len)
|
|
{
|
|
fentry_explicit_read_sz = len;
|
|
return 0;
|
|
}
|
|
|
|
|
|
__u32 fentry_explicit_manual_read_sz = 0;
|
|
|
|
SEC("fentry")
|
|
int BPF_PROG(handle_fentry_explicit_manual,
|
|
struct file *file, struct kobject *kobj,
|
|
struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len)
|
|
{
|
|
fentry_explicit_manual_read_sz = len;
|
|
return 0;
|
|
}
|
|
|
|
__u32 fexit_read_sz = 0;
|
|
int fexit_ret = 0;
|
|
|
|
SEC("fexit/bpf_testmod_test_read")
|
|
int BPF_PROG(handle_fexit,
|
|
struct file *file, struct kobject *kobj,
|
|
struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len,
|
|
int ret)
|
|
{
|
|
fexit_read_sz = len;
|
|
fexit_ret = ret;
|
|
return 0;
|
|
}
|
|
|
|
SEC("fexit/bpf_testmod_return_ptr")
|
|
int BPF_PROG(handle_fexit_ret, int arg, struct file *ret)
|
|
{
|
|
long buf = 0;
|
|
|
|
bpf_probe_read_kernel(&buf, 8, ret);
|
|
bpf_probe_read_kernel(&buf, 8, (char *)ret + 256);
|
|
*(volatile long long *)ret;
|
|
*(volatile int *)&ret->f_mode;
|
|
return 0;
|
|
}
|
|
|
|
__u32 fmod_ret_read_sz = 0;
|
|
|
|
SEC("fmod_ret/bpf_testmod_test_read")
|
|
int BPF_PROG(handle_fmod_ret,
|
|
struct file *file, struct kobject *kobj,
|
|
struct bin_attribute *bin_attr, char *buf, loff_t off, size_t len)
|
|
{
|
|
fmod_ret_read_sz = len;
|
|
return 0; /* don't override the exit code */
|
|
}
|
|
|
|
SEC("kprobe.multi/bpf_testmod_test_read")
|
|
int BPF_PROG(kprobe_multi)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|