Lines Matching +full:- +full:- +full:disable +full:- +full:fdt
1 # SPDX-License-Identifier: GPL-2.0
5 # things like ftrace and stack-protector are likely to cause trouble if left
9 # non-x86 reuses KBUILD_CFLAGS, x86 does not
10 cflags-y := $(KBUILD_CFLAGS)
12 cflags-$(CONFIG_X86_32) := -march=i386
13 cflags-$(CONFIG_X86_64) := -mcmodel=small
14 cflags-$(CONFIG_X86) += -m$(BITS) -D__KERNEL__ -std=gnu11 \
15 -fPIC -fno-strict-aliasing -mno-red-zone \
16 -mno-mmx -mno-sse -fshort-wchar \
17 -Wno-pointer-sign \
18 $(call cc-disable-warning, address-of-packed-member) \
19 $(call cc-disable-warning, gnu) \
20 -fno-asynchronous-unwind-tables \
24 # disable the stackleak plugin
25 cflags-$(CONFIG_ARM64) += -fpie $(DISABLE_STACKLEAK_PLUGIN) \
26 -fno-unwind-tables -fno-asynchronous-unwind-tables
27 cflags-$(CONFIG_ARM) += -DEFI_HAVE_STRLEN -DEFI_HAVE_STRNLEN \
28 -DEFI_HAVE_MEMCHR -DEFI_HAVE_STRRCHR \
29 -DEFI_HAVE_STRCMP -fno-builtin -fpic \
30 $(call cc-option,-mno-single-pic-base)
31 cflags-$(CONFIG_RISCV) += -fpic -mno-relax
32 cflags-$(CONFIG_LOONGARCH) += -fpie
34 cflags-$(CONFIG_EFI_PARAMS_FROM_FDT) += -I$(srctree)/scripts/dtc/libfdt
36 KBUILD_CFLAGS := $(subst $(CC_FLAGS_FTRACE),,$(cflags-y)) \
37 -Os -DDISABLE_BRANCH_PROFILING \
38 -include $(srctree)/include/linux/hidden.h \
39 -D__NO_FORTIFY \
40 -ffreestanding \
41 -fno-stack-protector \
42 $(call cc-option,-fno-addrsig) \
43 -D__DISABLE_EXPORTS
50 KBUILD_CFLAGS := $(filter-out $(RANDSTRUCT_CFLAGS), $(KBUILD_CFLAGS))
53 KBUILD_CFLAGS := $(filter-out $(CC_FLAGS_SCS), $(KBUILD_CFLAGS))
54 # disable CFI
55 KBUILD_CFLAGS := $(filter-out $(CC_FLAGS_CFI), $(KBUILD_CFLAGS))
56 # disable LTO
57 KBUILD_CFLAGS := $(filter-out $(CC_FLAGS_LTO), $(KBUILD_CFLAGS))
70 lib-y := efi-stub-helper.o gop.o secureboot.o tpm.o \
72 skip_spaces.o lib-cmdline.o lib-ctype.o \
76 libfdt-deps := fdt_rw.c fdt_ro.c fdt_wip.c fdt.c \
79 lib-$(CONFIG_EFI_PARAMS_FROM_FDT) += fdt.o \
80 $(patsubst %.c,lib-%.o,$(libfdt-deps))
82 $(obj)/lib-%.o: $(srctree)/lib/%.c FORCE
85 lib-$(CONFIG_EFI_GENERIC_STUB) += efi-stub.o string.o intrinsics.o systable.o \
86 screen_info.o efi-stub-entry.o
88 lib-$(CONFIG_ARM) += arm32-stub.o
89 lib-$(CONFIG_ARM64) += kaslr.o arm64.o arm64-stub.o smbios.o
90 lib-$(CONFIG_X86) += x86-stub.o
91 lib-$(CONFIG_X86_64) += x86-5lvl.o
92 lib-$(CONFIG_RISCV) += kaslr.o riscv.o riscv-stub.o
93 lib-$(CONFIG_LOONGARCH) += loongarch.o loongarch-stub.o
95 CFLAGS_arm32-stub.o := -DTEXT_OFFSET=$(TEXT_OFFSET)
97 zboot-obj-$(CONFIG_RISCV) := lib-clz_ctz.o lib-ashldi3.o
98 lib-$(CONFIG_EFI_ZBOOT) += zboot.o $(zboot-obj-y)
100 lib-$(CONFIG_UNACCEPTED_MEMORY) += unaccepted_memory.o bitmap.o find.o
102 extra-y := $(lib-y)
103 lib-y := $(patsubst %.o,%.stub.o,$(lib-y))
105 # Even when -mbranch-protection=none is set, Clang will generate a
106 # .note.gnu.property for code-less object files (like lib/ctype.c),
109 STUBCOPY_FLAGS-y += --remove-section=.note.gnu.property
111 STUBCOPY_RELOC-$(CONFIG_X86_32) := R_386_32
112 STUBCOPY_RELOC-$(CONFIG_X86_64) := R_X86_64_64
119 STUBCOPY_FLAGS-$(CONFIG_ARM) += --rename-section .data=.data.efistub \
120 --rename-section .bss=.bss.efistub,load,alloc
121 STUBCOPY_RELOC-$(CONFIG_ARM) := R_ARM_ABS
137 STUBCOPY_FLAGS-$(CONFIG_ARM64) += --prefix-alloc-sections=.init \
138 --prefix-symbols=__efistub_
139 STUBCOPY_RELOC-$(CONFIG_ARM64) := R_AARCH64_ABS
141 # For RISC-V, we don't need anything special other than arm64. Keep all the
144 STUBCOPY_FLAGS-$(CONFIG_RISCV) += --prefix-alloc-sections=.init \
145 --prefix-symbols=__efistub_
146 STUBCOPY_RELOC-$(CONFIG_RISCV) := R_RISCV_HI20
150 STUBCOPY_FLAGS-$(CONFIG_LOONGARCH) += --prefix-alloc-sections=.init \
151 --prefix-symbols=__efistub_
152 STUBCOPY_RELOC-$(CONFIG_LOONGARCH) := R_LARCH_MARK_LA
165 $(STRIP) --strip-debug -o $@ $<; \
166 if $(OBJDUMP) -r $@ | grep $(STUBCOPY_RELOC-y); then \
170 $(OBJCOPY) $(STUBCOPY_FLAGS-y) $< $@