1 # SPDX-License-Identifier: GPL-2.0
2 obj-y
+= vsyscall.o vsyscall-syscall.o vsyscall-syms.o
4 $(obj
)/vsyscall-syscall.o
: $(obj
)/vsyscall-trapa.so
6 # Teach kbuild about targets
7 targets
+= vsyscall-trapa.o vsyscall-traps.so
8 targets
+= vsyscall-note.o vsyscall.lds vsyscall-dummy.o
10 # The DSO images are built using a special linker script
11 quiet_cmd_syscall
= SYSCALL
$@
12 cmd_syscall
= $(CC
) -nostdlib
$(SYSCFLAGS_
$(@F
)) \
13 -Wl
,-T
,$(filter-out FORCE
,$^
) -o
$@
15 export CPPFLAGS_vsyscall.lds
+= -P
-C
-Ush
17 vsyscall-flags
= -shared
-s
-Wl
,-soname
=linux-gate.so
.1 -Wl
,--hash-style
=sysv
19 SYSCFLAGS_vsyscall-trapa.so
= $(vsyscall-flags
)
21 $(obj
)/vsyscall-trapa.so
: \
22 $(obj
)/vsyscall-
%.so
: $(obj
)/vsyscall.lds
$(obj
)/vsyscall-
%.o FORCE
23 $(call if_changed
,syscall
)
25 # We also create a special relocatable object that should mirror the symbol
26 # table and layout of the linked DSO. With ld -R we can then refer to
27 # these symbols in the kernel code rather than hand-coded addresses.
28 SYSCFLAGS_vsyscall-dummy.o
= -r
29 $(obj
)/vsyscall-dummy.o
: $(obj
)/vsyscall.lds \
30 $(obj
)/vsyscall-trapa.o
$(obj
)/vsyscall-note.o FORCE
31 $(call if_changed
,syscall
)
33 LDFLAGS_vsyscall-syms.o
:= -r
-R
34 $(obj
)/vsyscall-syms.o
: $(obj
)/vsyscall-dummy.o FORCE