Linux 4.0-rc1
.. after extensive statistical analysis of my G+ polling, I've come to
the inescapable conclusion that internet polls are bad.
Big surprise.
But "Hurr durr I'ma sheep" trounced "I like online polls" by a 62-to-38%
margin, in a poll that people weren't even supposed to participate in.
Who can argue with solid numbers like that? 5,796 votes from people who
can't even follow the most basic directions?
In contrast, "v4.0" beat out "v3.20" by a slimmer margin of 56-to-44%,
but with a total of 29,110 votes right now.
Now, arguably, that vote spread is only about 3,200 votes, which is less
than the almost six thousand votes that the "please ignore" poll got, so
it could be considered noise.
But hey, I asked, so I'll honor the votes.
2015-02-23 03:21:14 +01:00
|
|
|
VERSION = 4
|
|
|
|
PATCHLEVEL = 0
|
2011-05-30 02:43:36 +02:00
|
|
|
SUBLEVEL = 0
|
Linux 4.0-rc1
.. after extensive statistical analysis of my G+ polling, I've come to
the inescapable conclusion that internet polls are bad.
Big surprise.
But "Hurr durr I'ma sheep" trounced "I like online polls" by a 62-to-38%
margin, in a poll that people weren't even supposed to participate in.
Who can argue with solid numbers like that? 5,796 votes from people who
can't even follow the most basic directions?
In contrast, "v4.0" beat out "v3.20" by a slimmer margin of 56-to-44%,
but with a total of 29,110 votes right now.
Now, arguably, that vote spread is only about 3,200 votes, which is less
than the almost six thousand votes that the "please ignore" poll got, so
it could be considered noise.
But hey, I asked, so I'll honor the votes.
2015-02-23 03:21:14 +01:00
|
|
|
EXTRAVERSION = -rc1
|
|
|
|
NAME = Hurr durr I'ma sheep
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# *DOCUMENTATION*
|
|
|
|
# To see a list of typical targets execute "make help"
|
|
|
|
# More info can be located in ./README
|
|
|
|
# Comments in this file are targeted only to the developer, do not
|
|
|
|
# expect to learn how to build the kernel reading this file.
|
|
|
|
|
2014-09-09 13:02:22 +02:00
|
|
|
# Do not use make's built-in rules and variables
|
|
|
|
# (this increases performance and avoids hard-to-debug behaviour);
|
|
|
|
MAKEFLAGS += -rR
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2009-12-17 15:56:11 +01:00
|
|
|
# Avoid funny character set dependencies
|
2009-12-18 00:51:37 +01:00
|
|
|
unexport LC_ALL
|
2009-12-17 15:56:11 +01:00
|
|
|
LC_COLLATE=C
|
|
|
|
LC_NUMERIC=C
|
2010-01-08 12:25:37 +01:00
|
|
|
export LC_COLLATE LC_NUMERIC
|
2009-12-17 15:56:11 +01:00
|
|
|
|
2013-11-11 15:27:43 +01:00
|
|
|
# Avoid interference with shell env settings
|
|
|
|
unexport GREP_OPTIONS
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
# We are using a recursive build, so we need to do a little thinking
|
|
|
|
# to get the ordering right.
|
|
|
|
#
|
|
|
|
# Most importantly: sub-Makefiles should only ever modify files in
|
|
|
|
# their own directory. If in some directory we have a dependency on
|
|
|
|
# a file in another dir (which doesn't happen often, but it's often
|
|
|
|
# unavoidable when linking the built-in.o targets which finally
|
|
|
|
# turn into vmlinux), we will call a sub make in that other dir, and
|
|
|
|
# after that we are sure that everything which is in that other dir
|
|
|
|
# is now up to date.
|
|
|
|
#
|
|
|
|
# The only cases where we need to modify files which have global
|
|
|
|
# effects are thus separated out and done before the recursive
|
|
|
|
# descending is started. They are now explicitly listed as the
|
|
|
|
# prepare rule.
|
|
|
|
|
2014-07-04 14:29:30 +02:00
|
|
|
# Beautify output
|
|
|
|
# ---------------------------------------------------------------------------
|
|
|
|
#
|
|
|
|
# Normally, we echo the whole command before executing it. By making
|
|
|
|
# that echo $($(quiet)$(cmd)), we now have the possibility to set
|
|
|
|
# $(quiet) to choose other forms of output instead, e.g.
|
|
|
|
#
|
|
|
|
# quiet_cmd_cc_o_c = Compiling $(RELDIR)/$@
|
|
|
|
# cmd_cc_o_c = $(CC) $(c_flags) -c -o $@ $<
|
|
|
|
#
|
|
|
|
# If $(quiet) is empty, the whole command will be printed.
|
|
|
|
# If it is set to "quiet_", only the short version will be printed.
|
|
|
|
# If it is set to "silent_", nothing will be printed at all, since
|
|
|
|
# the variable $(silent_cmd_cc_o_c) doesn't exist.
|
|
|
|
#
|
|
|
|
# A simple variant is to prefix commands with $(Q) - that's useful
|
|
|
|
# for commands that shall be hidden in non-verbose mode.
|
|
|
|
#
|
|
|
|
# $(Q)ln $@ :<
|
|
|
|
#
|
|
|
|
# If KBUILD_VERBOSE equals 0 then the above command will be hidden.
|
|
|
|
# If KBUILD_VERBOSE equals 1 then the above command is displayed.
|
|
|
|
#
|
2005-04-17 00:20:36 +02:00
|
|
|
# To put more focus on warnings, be less verbose as default
|
|
|
|
# Use 'make V=1' to see the full commands
|
|
|
|
|
2009-05-26 10:03:07 +02:00
|
|
|
ifeq ("$(origin V)", "command line")
|
|
|
|
KBUILD_VERBOSE = $(V)
|
2005-04-17 00:20:36 +02:00
|
|
|
endif
|
|
|
|
ifndef KBUILD_VERBOSE
|
|
|
|
KBUILD_VERBOSE = 0
|
|
|
|
endif
|
|
|
|
|
2014-07-04 14:29:30 +02:00
|
|
|
ifeq ($(KBUILD_VERBOSE),1)
|
|
|
|
quiet =
|
|
|
|
Q =
|
|
|
|
else
|
|
|
|
quiet=quiet_
|
|
|
|
Q = @
|
|
|
|
endif
|
|
|
|
|
|
|
|
# If the user is running make -s (silent mode), suppress echoing of
|
|
|
|
# commands
|
|
|
|
|
|
|
|
ifneq ($(filter 4.%,$(MAKE_VERSION)),) # make-4
|
|
|
|
ifneq ($(filter %s ,$(firstword x$(MAKEFLAGS))),)
|
|
|
|
quiet=silent_
|
|
|
|
endif
|
|
|
|
else # make-3.8x
|
|
|
|
ifneq ($(filter s% -s%,$(MAKEFLAGS)),)
|
|
|
|
quiet=silent_
|
|
|
|
endif
|
|
|
|
endif
|
|
|
|
|
|
|
|
export quiet Q KBUILD_VERBOSE
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
# kbuild supports saving output files in a separate directory.
|
|
|
|
# To locate output files in a separate directory two syntaxes are supported.
|
|
|
|
# In both cases the working directory must be the root of the kernel src.
|
|
|
|
# 1) O=
|
|
|
|
# Use "make O=dir/to/store/output/files/"
|
2006-06-25 00:07:55 +02:00
|
|
|
#
|
2005-04-17 00:20:36 +02:00
|
|
|
# 2) Set KBUILD_OUTPUT
|
|
|
|
# Set the environment variable KBUILD_OUTPUT to point to the directory
|
|
|
|
# where the output files shall be placed.
|
|
|
|
# export KBUILD_OUTPUT=dir/to/store/output/files/
|
|
|
|
# make
|
|
|
|
#
|
|
|
|
# The O= assignment takes precedence over the KBUILD_OUTPUT environment
|
|
|
|
# variable.
|
|
|
|
|
|
|
|
# KBUILD_SRC is set on invocation of make in OBJ directory
|
|
|
|
# KBUILD_SRC is not intended to be used by the regular user (for now)
|
|
|
|
ifeq ($(KBUILD_SRC),)
|
|
|
|
|
|
|
|
# OK, Make called in directory where kernel src resides
|
|
|
|
# Do we want to locate output files in a separate directory?
|
2009-05-26 10:03:07 +02:00
|
|
|
ifeq ("$(origin O)", "command line")
|
|
|
|
KBUILD_OUTPUT := $(O)
|
2005-04-17 00:20:36 +02:00
|
|
|
endif
|
|
|
|
|
|
|
|
# That's our default target when none is given on the command line
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY := _all
|
2005-04-17 00:20:36 +02:00
|
|
|
_all:
|
|
|
|
|
2007-12-06 22:20:11 +01:00
|
|
|
# Cancel implicit rules on top Makefile
|
|
|
|
$(CURDIR)/Makefile Makefile: ;
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
ifneq ($(KBUILD_OUTPUT),)
|
|
|
|
# Invoke a second make in the output directory, passing relevant variables
|
|
|
|
# check that the output directory actually exists
|
|
|
|
saved-output := $(KBUILD_OUTPUT)
|
2014-03-31 09:41:36 +02:00
|
|
|
KBUILD_OUTPUT := $(shell mkdir -p $(KBUILD_OUTPUT) && cd $(KBUILD_OUTPUT) \
|
|
|
|
&& /bin/pwd)
|
2005-04-17 00:20:36 +02:00
|
|
|
$(if $(KBUILD_OUTPUT),, \
|
2014-03-31 09:41:36 +02:00
|
|
|
$(error failed to create output directory "$(saved-output)"))
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2007-09-22 01:09:02 +02:00
|
|
|
PHONY += $(MAKECMDGOALS) sub-make
|
|
|
|
|
2007-12-06 22:20:11 +01:00
|
|
|
$(filter-out _all sub-make $(CURDIR)/Makefile, $(MAKECMDGOALS)) _all: sub-make
|
2012-10-15 14:49:12 +02:00
|
|
|
@:
|
2007-09-22 01:09:02 +02:00
|
|
|
|
|
|
|
sub-make: FORCE
|
2014-09-09 13:02:23 +02:00
|
|
|
$(Q)$(MAKE) -C $(KBUILD_OUTPUT) KBUILD_SRC=$(CURDIR) \
|
2014-09-09 13:02:24 +02:00
|
|
|
-f $(CURDIR)/Makefile $(filter-out _all sub-make,$(MAKECMDGOALS))
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# Leave processing to above invocation of make
|
|
|
|
skip-makefile := 1
|
|
|
|
endif # ifneq ($(KBUILD_OUTPUT),)
|
|
|
|
endif # ifeq ($(KBUILD_SRC),)
|
|
|
|
|
|
|
|
# We process the rest of the Makefile if this is the final invocation of make
|
|
|
|
ifeq ($(skip-makefile),)
|
|
|
|
|
2014-09-09 13:02:22 +02:00
|
|
|
# Do not print "Entering directory ...",
|
|
|
|
# but we want to display it when entering to the output directory
|
|
|
|
# so that IDEs/editors are able to understand relative filenames.
|
|
|
|
MAKEFLAGS += --no-print-directory
|
|
|
|
|
2014-09-09 13:02:24 +02:00
|
|
|
# Call a source code checker (by default, "sparse") as part of the
|
|
|
|
# C compilation.
|
|
|
|
#
|
|
|
|
# Use 'make C=1' to enable checking of only re-compiled files.
|
|
|
|
# Use 'make C=2' to enable checking of *all* source files, regardless
|
|
|
|
# of whether they are re-compiled or not.
|
|
|
|
#
|
|
|
|
# See the file "Documentation/sparse.txt" for more details, including
|
|
|
|
# where to get the "sparse" utility.
|
|
|
|
|
|
|
|
ifeq ("$(origin C)", "command line")
|
|
|
|
KBUILD_CHECKSRC = $(C)
|
|
|
|
endif
|
|
|
|
ifndef KBUILD_CHECKSRC
|
|
|
|
KBUILD_CHECKSRC = 0
|
|
|
|
endif
|
|
|
|
|
|
|
|
# Use make M=dir to specify directory of external module to build
|
|
|
|
# Old syntax make ... SUBDIRS=$PWD is still supported
|
|
|
|
# Setting the environment variable KBUILD_EXTMOD take precedence
|
|
|
|
ifdef SUBDIRS
|
|
|
|
KBUILD_EXTMOD ?= $(SUBDIRS)
|
|
|
|
endif
|
|
|
|
|
|
|
|
ifeq ("$(origin M)", "command line")
|
|
|
|
KBUILD_EXTMOD := $(M)
|
|
|
|
endif
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
# If building an external module we do not care about the all: rule
|
|
|
|
# but instead _all depend on modules
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += all
|
2005-04-17 00:20:36 +02:00
|
|
|
ifeq ($(KBUILD_EXTMOD),)
|
|
|
|
_all: all
|
|
|
|
else
|
|
|
|
_all: modules
|
|
|
|
endif
|
|
|
|
|
2014-04-25 23:25:18 +02:00
|
|
|
ifeq ($(KBUILD_SRC),)
|
|
|
|
# building in the source tree
|
|
|
|
srctree := .
|
|
|
|
else
|
|
|
|
ifeq ($(KBUILD_SRC)/,$(dir $(CURDIR)))
|
|
|
|
# building in a subdirectory of the source tree
|
|
|
|
srctree := ..
|
|
|
|
else
|
|
|
|
srctree := $(KBUILD_SRC)
|
|
|
|
endif
|
|
|
|
endif
|
2014-04-25 17:29:45 +02:00
|
|
|
objtree := .
|
2005-04-17 00:20:36 +02:00
|
|
|
src := $(srctree)
|
|
|
|
obj := $(objtree)
|
|
|
|
|
2006-02-19 13:50:37 +01:00
|
|
|
VPATH := $(srctree)$(if $(KBUILD_EXTMOD),:$(KBUILD_EXTMOD))
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2009-06-19 09:40:26 +02:00
|
|
|
export srctree objtree VPATH
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
|
|
|
|
# SUBARCH tells the usermode build what the underlying arch is. That is set
|
|
|
|
# first, and if a usermode build is happening, the "ARCH=um" on the command
|
|
|
|
# line overrides the setting of ARCH below. If a native build is happening,
|
2014-04-28 09:26:18 +02:00
|
|
|
# then ARCH is assigned, getting whatever value it gets normally, and
|
2005-04-17 00:20:36 +02:00
|
|
|
# SUBARCH is subsequently ignored.
|
|
|
|
|
2012-12-20 22:51:55 +01:00
|
|
|
SUBARCH := $(shell uname -m | sed -e s/i.86/x86/ -e s/x86_64/x86/ \
|
|
|
|
-e s/sun4u/sparc64/ \
|
2005-04-17 00:20:36 +02:00
|
|
|
-e s/arm.*/arm/ -e s/sa110/arm/ \
|
2005-11-11 23:27:32 +01:00
|
|
|
-e s/s390x/s390/ -e s/parisc64/parisc/ \
|
2007-11-02 04:22:47 +01:00
|
|
|
-e s/ppc.*/powerpc/ -e s/mips.*/mips/ \
|
2013-01-18 20:00:47 +01:00
|
|
|
-e s/sh[234].*/sh/ -e s/aarch64.*/arm64/ )
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# Cross compiling and selecting different set of gcc/bin-utils
|
|
|
|
# ---------------------------------------------------------------------------
|
|
|
|
#
|
|
|
|
# When performing cross compilation for other architectures ARCH shall be set
|
|
|
|
# to the target architecture. (See arch/* for the possibilities).
|
|
|
|
# ARCH can be set during invocation of make:
|
|
|
|
# make ARCH=ia64
|
|
|
|
# Another way is to have ARCH set in the environment.
|
|
|
|
# The default ARCH is the host where make is executed.
|
|
|
|
|
|
|
|
# CROSS_COMPILE specify the prefix used for all executables used
|
|
|
|
# during compilation. Only gcc and related bin-utils executables
|
|
|
|
# are prefixed with $(CROSS_COMPILE).
|
|
|
|
# CROSS_COMPILE can be set on the command line
|
|
|
|
# make CROSS_COMPILE=ia64-linux-
|
|
|
|
# Alternatively CROSS_COMPILE can be set in the environment.
|
2009-12-22 01:24:06 +01:00
|
|
|
# A third alternative is to store a setting in .config so that plain
|
|
|
|
# "make" in the configured kernel build directory always uses that.
|
2005-04-17 00:20:36 +02:00
|
|
|
# Default value for CROSS_COMPILE is not to prefix executables
|
|
|
|
# Note: Some architectures assign CROSS_COMPILE in their arch/*/Makefile
|
2009-10-11 23:22:58 +02:00
|
|
|
ARCH ?= $(SUBARCH)
|
2009-12-22 01:24:06 +01:00
|
|
|
CROSS_COMPILE ?= $(CONFIG_CROSS_COMPILE:"%"=%)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# Architecture as present in compile.h
|
2007-10-11 11:11:36 +02:00
|
|
|
UTS_MACHINE := $(ARCH)
|
|
|
|
SRCARCH := $(ARCH)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2007-11-12 20:14:19 +01:00
|
|
|
# Additional ARCH settings for x86
|
|
|
|
ifeq ($(ARCH),i386)
|
|
|
|
SRCARCH := x86
|
|
|
|
endif
|
|
|
|
ifeq ($(ARCH),x86_64)
|
|
|
|
SRCARCH := x86
|
|
|
|
endif
|
2007-10-25 19:42:04 +02:00
|
|
|
|
2008-12-03 08:17:12 +01:00
|
|
|
# Additional ARCH settings for sparc
|
2010-10-25 07:48:23 +02:00
|
|
|
ifeq ($(ARCH),sparc32)
|
|
|
|
SRCARCH := sparc
|
|
|
|
endif
|
2008-07-27 23:00:59 +02:00
|
|
|
ifeq ($(ARCH),sparc64)
|
2008-12-03 08:17:12 +01:00
|
|
|
SRCARCH := sparc
|
2008-07-27 23:00:59 +02:00
|
|
|
endif
|
2008-06-21 00:24:17 +02:00
|
|
|
|
2009-04-11 01:39:27 +02:00
|
|
|
# Additional ARCH settings for sh
|
|
|
|
ifeq ($(ARCH),sh64)
|
|
|
|
SRCARCH := sh
|
|
|
|
endif
|
|
|
|
|
2011-05-04 20:38:26 +02:00
|
|
|
# Additional ARCH settings for tile
|
2011-05-25 21:24:00 +02:00
|
|
|
ifeq ($(ARCH),tilepro)
|
|
|
|
SRCARCH := tile
|
|
|
|
endif
|
2011-05-04 20:38:26 +02:00
|
|
|
ifeq ($(ARCH),tilegx)
|
|
|
|
SRCARCH := tile
|
|
|
|
endif
|
|
|
|
|
2008-12-03 08:17:12 +01:00
|
|
|
# Where to locate arch specific headers
|
|
|
|
hdr-arch := $(SRCARCH)
|
|
|
|
|
2006-06-09 07:12:51 +02:00
|
|
|
KCONFIG_CONFIG ?= .config
|
2010-12-14 17:39:44 +01:00
|
|
|
export KCONFIG_CONFIG
|
2006-06-09 07:12:51 +02:00
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
# SHELL used by kbuild
|
|
|
|
CONFIG_SHELL := $(shell if [ -x "$$BASH" ]; then echo $$BASH; \
|
|
|
|
else if [ -x /bin/bash ]; then echo /bin/bash; \
|
|
|
|
else echo sh; fi ; fi)
|
|
|
|
|
2006-06-25 00:07:55 +02:00
|
|
|
HOSTCC = gcc
|
|
|
|
HOSTCXX = g++
|
2014-10-20 11:23:12 +02:00
|
|
|
HOSTCFLAGS = -Wall -Wmissing-prototypes -Wstrict-prototypes -O2 -fomit-frame-pointer -std=gnu89
|
2006-06-25 00:07:55 +02:00
|
|
|
HOSTCXXFLAGS = -O2
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2013-09-04 04:27:23 +02:00
|
|
|
ifeq ($(shell $(HOSTCC) -v 2>&1 | grep -c "clang version"), 1)
|
|
|
|
HOSTCFLAGS += -Wno-unused-value -Wno-unused-parameter \
|
|
|
|
-Wno-missing-field-initializers -fno-delete-null-pointer-checks
|
|
|
|
endif
|
|
|
|
|
2006-06-25 00:07:55 +02:00
|
|
|
# Decide whether to build built-in, modular, or both.
|
|
|
|
# Normally, just do built-in.
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
KBUILD_MODULES :=
|
|
|
|
KBUILD_BUILTIN := 1
|
|
|
|
|
2014-04-28 09:32:43 +02:00
|
|
|
# If we have only "make modules", don't compile built-in objects.
|
|
|
|
# When we're building modules with modversions, we need to consider
|
|
|
|
# the built-in objects during the descend as well, in order to
|
|
|
|
# make sure the checksums are up to date before we record them.
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
ifeq ($(MAKECMDGOALS),modules)
|
|
|
|
KBUILD_BUILTIN := $(if $(CONFIG_MODVERSIONS),1)
|
|
|
|
endif
|
|
|
|
|
2014-04-28 09:32:43 +02:00
|
|
|
# If we have "make <whatever> modules", compile modules
|
|
|
|
# in addition to whatever we do anyway.
|
|
|
|
# Just "make" or "make all" shall build modules as well
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
ifneq ($(filter all _all modules,$(MAKECMDGOALS)),)
|
|
|
|
KBUILD_MODULES := 1
|
|
|
|
endif
|
|
|
|
|
|
|
|
ifeq ($(MAKECMDGOALS),)
|
|
|
|
KBUILD_MODULES := 1
|
|
|
|
endif
|
|
|
|
|
2005-07-27 08:10:10 +02:00
|
|
|
export KBUILD_MODULES KBUILD_BUILTIN
|
2005-04-17 00:20:36 +02:00
|
|
|
export KBUILD_CHECKSRC KBUILD_SRC KBUILD_EXTMOD
|
|
|
|
|
2013-09-04 04:27:23 +02:00
|
|
|
ifneq ($(CC),)
|
|
|
|
ifeq ($(shell $(CC) -v 2>&1 | grep -c "clang version"), 1)
|
|
|
|
COMPILER := clang
|
|
|
|
else
|
|
|
|
COMPILER := gcc
|
|
|
|
endif
|
|
|
|
export COMPILER
|
|
|
|
endif
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# Look for make include files relative to root of kernel src
|
|
|
|
MAKEFLAGS += --include-dir=$(srctree)
|
|
|
|
|
2007-12-06 22:20:11 +01:00
|
|
|
# We need some generic definitions (do not try to remake the file).
|
|
|
|
$(srctree)/scripts/Kbuild.include: ;
|
2006-12-10 11:18:40 +01:00
|
|
|
include $(srctree)/scripts/Kbuild.include
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# Make variables (CC, etc...)
|
|
|
|
AS = $(CROSS_COMPILE)as
|
|
|
|
LD = $(CROSS_COMPILE)ld
|
|
|
|
CC = $(CROSS_COMPILE)gcc
|
|
|
|
CPP = $(CC) -E
|
|
|
|
AR = $(CROSS_COMPILE)ar
|
|
|
|
NM = $(CROSS_COMPILE)nm
|
|
|
|
STRIP = $(CROSS_COMPILE)strip
|
|
|
|
OBJCOPY = $(CROSS_COMPILE)objcopy
|
|
|
|
OBJDUMP = $(CROSS_COMPILE)objdump
|
|
|
|
AWK = awk
|
|
|
|
GENKSYMS = scripts/genksyms/genksyms
|
2009-07-20 21:37:11 +02:00
|
|
|
INSTALLKERNEL := installkernel
|
2005-04-17 00:20:36 +02:00
|
|
|
DEPMOD = /sbin/depmod
|
|
|
|
PERL = perl
|
2014-07-18 06:40:11 +02:00
|
|
|
PYTHON = python
|
2005-04-17 00:20:36 +02:00
|
|
|
CHECK = sparse
|
|
|
|
|
2008-12-27 22:38:44 +01:00
|
|
|
CHECKFLAGS := -D__linux__ -Dlinux -D__STDC__ -Dunix -D__unix__ \
|
|
|
|
-Wbitwise -Wno-return-void $(CF)
|
kbuild: allow assignment to {A,C,LD}FLAGS_MODULE on the command line
It is now possible to assign options to AS, CC and LD
on the command line - which is only used when building modules.
{A,C,LD}FLAGS_MODULE was all used both in the top-level Makefile
in the arch makefiles, thus users had no way to specify
additional options to AS, CC, LD when building modules
without overriding the original value.
Introduce a new set of variables KBUILD_{A,C,LD}FLAGS_MODULE
that is used by arch specific files and free up
{A,C,LD}FLAGS_MODULE so they can be assigned on
the command line.
All arch Makefiles that used the old variables has been updated.
Note: Previously we had a MODFLAGS variable for both
AS and CC. But in favour of consistency this was dropped.
So in some cases arch Makefile has one assignmnet replaced by
two assignmnets.
Note2: MODFLAGS was not documented and is dropped
without any notice. I do not expect much/any breakage
from this.
Signed-off-by: Sam Ravnborg <sam@ravnborg.org>
Cc: Denys Vlasenko <vda.linux@googlemail.com>
Cc: Haavard Skinnemoen <hskinnemoen@atmel.com>
Cc: Mike Frysinger <vapier@gentoo.org>
Cc: Tony Luck <tony.luck@intel.com>
Cc: Geert Uytterhoeven <geert@linux-m68k.org>
Cc: Ralf Baechle <ralf@linux-mips.org>
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Cc: Martin Schwidefsky <schwidefsky@de.ibm.com>
Cc: Chen Liqin <liqin.chen@sunplusct.com>
Acked-by: Mike Frysinger <vapier@gentoo.org> [blackfin]
Acked-by: Haavard Skinnemoen <haavard.skinnemoen@atmel.com> [avr32]
Signed-off-by: Michal Marek <mmarek@suse.cz>
2010-07-28 17:33:09 +02:00
|
|
|
CFLAGS_MODULE =
|
|
|
|
AFLAGS_MODULE =
|
|
|
|
LDFLAGS_MODULE =
|
2005-04-17 00:20:36 +02:00
|
|
|
CFLAGS_KERNEL =
|
|
|
|
AFLAGS_KERNEL =
|
2009-06-18 01:28:08 +02:00
|
|
|
CFLAGS_GCOV = -fprofile-arcs -ftest-coverage
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
|
2012-10-02 19:01:26 +02:00
|
|
|
# Use USERINCLUDE when you must reference the UAPI directories only.
|
|
|
|
USERINCLUDE := \
|
|
|
|
-I$(srctree)/arch/$(hdr-arch)/include/uapi \
|
|
|
|
-Iarch/$(hdr-arch)/include/generated/uapi \
|
|
|
|
-I$(srctree)/include/uapi \
|
|
|
|
-Iinclude/generated/uapi \
|
|
|
|
-include $(srctree)/include/linux/kconfig.h
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
# Use LINUXINCLUDE when you must reference the include/ directory.
|
|
|
|
# Needed to be compatible with the O= option
|
2012-10-02 19:01:26 +02:00
|
|
|
LINUXINCLUDE := \
|
|
|
|
-I$(srctree)/arch/$(hdr-arch)/include \
|
2015-01-08 16:16:39 +01:00
|
|
|
-Iarch/$(hdr-arch)/include/generated/uapi \
|
2012-10-02 19:01:26 +02:00
|
|
|
-Iarch/$(hdr-arch)/include/generated \
|
|
|
|
$(if $(KBUILD_SRC), -I$(srctree)/include) \
|
|
|
|
-Iinclude \
|
|
|
|
$(USERINCLUDE)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2008-11-21 21:50:02 +01:00
|
|
|
KBUILD_CPPFLAGS := -D__KERNEL__
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2007-10-14 22:21:35 +02:00
|
|
|
KBUILD_CFLAGS := -Wall -Wundef -Wstrict-prototypes -Wno-trigraphs \
|
2007-07-16 08:41:38 +02:00
|
|
|
-fno-strict-aliasing -fno-common \
|
2009-06-15 07:54:02 +02:00
|
|
|
-Werror-implicit-function-declaration \
|
2014-10-20 11:23:12 +02:00
|
|
|
-Wno-format-security \
|
|
|
|
-std=gnu89
|
Makefile: Fix unrecognized cross-compiler command line options
On architectures that setup CROSS_COMPILE in their arch/*/Makefile
(arc, blackfin, m68k, mips, parisc, score, sh, tile, unicore32, xtensa),
cc-option and cc-disable-warning may check against the wrong compiler,
causing errors like
cc1: error: unrecognized command line option "-Wno-maybe-uninitialized"
if the host gcc supports a compiler option, while the cross compiler
doesn't support that option.
Move all logic using cc-option or cc-disable-warning below the inclusion
of the arch's Makefile to fix this.
Introduced by
- commit e74fc973b6e531fef1fce8b101ffff05ecfb774c ("Turn off
-Wmaybe-uninitialized when building with -Os"),
- commit 61163efae02040f66a95c8ed17f4407951ba58fa ("kbuild: LLVMLinux:
Add Kbuild support for building kernel with Clang").
As -Wno-maybe-uninitialized requires a quite recent gcc (gcc 4.6.3 on
Ubuntu 12.04 LTS doesn't support it), this only showed up recently (gcc
4.8.2 on Ubuntu 14.04 LTS does support it).
Signed-off-by: Geert Uytterhoeven <geert@linux-m68k.org>
Signed-off-by: Michal Marek <mmarek@suse.cz>
2014-05-27 09:54:12 +02:00
|
|
|
|
2010-07-28 19:11:27 +02:00
|
|
|
KBUILD_AFLAGS_KERNEL :=
|
|
|
|
KBUILD_CFLAGS_KERNEL :=
|
2007-10-15 21:59:31 +02:00
|
|
|
KBUILD_AFLAGS := -D__ASSEMBLY__
|
kbuild: allow assignment to {A,C,LD}FLAGS_MODULE on the command line
It is now possible to assign options to AS, CC and LD
on the command line - which is only used when building modules.
{A,C,LD}FLAGS_MODULE was all used both in the top-level Makefile
in the arch makefiles, thus users had no way to specify
additional options to AS, CC, LD when building modules
without overriding the original value.
Introduce a new set of variables KBUILD_{A,C,LD}FLAGS_MODULE
that is used by arch specific files and free up
{A,C,LD}FLAGS_MODULE so they can be assigned on
the command line.
All arch Makefiles that used the old variables has been updated.
Note: Previously we had a MODFLAGS variable for both
AS and CC. But in favour of consistency this was dropped.
So in some cases arch Makefile has one assignmnet replaced by
two assignmnets.
Note2: MODFLAGS was not documented and is dropped
without any notice. I do not expect much/any breakage
from this.
Signed-off-by: Sam Ravnborg <sam@ravnborg.org>
Cc: Denys Vlasenko <vda.linux@googlemail.com>
Cc: Haavard Skinnemoen <hskinnemoen@atmel.com>
Cc: Mike Frysinger <vapier@gentoo.org>
Cc: Tony Luck <tony.luck@intel.com>
Cc: Geert Uytterhoeven <geert@linux-m68k.org>
Cc: Ralf Baechle <ralf@linux-mips.org>
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Cc: Martin Schwidefsky <schwidefsky@de.ibm.com>
Cc: Chen Liqin <liqin.chen@sunplusct.com>
Acked-by: Mike Frysinger <vapier@gentoo.org> [blackfin]
Acked-by: Haavard Skinnemoen <haavard.skinnemoen@atmel.com> [avr32]
Signed-off-by: Michal Marek <mmarek@suse.cz>
2010-07-28 17:33:09 +02:00
|
|
|
KBUILD_AFLAGS_MODULE := -DMODULE
|
|
|
|
KBUILD_CFLAGS_MODULE := -DMODULE
|
|
|
|
KBUILD_LDFLAGS_MODULE := -T $(srctree)/scripts/module-common.lds
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2006-06-09 07:12:43 +02:00
|
|
|
# Read KERNELRELEASE from include/config/kernel.release (if it exists)
|
|
|
|
KERNELRELEASE = $(shell cat include/config/kernel.release 2> /dev/null)
|
2011-05-30 13:36:07 +02:00
|
|
|
KERNELVERSION = $(VERSION)$(if $(PATCHLEVEL),.$(PATCHLEVEL)$(if $(SUBLEVEL),.$(SUBLEVEL)))$(EXTRAVERSION)
|
2006-01-09 21:20:34 +01:00
|
|
|
|
2006-06-25 00:07:55 +02:00
|
|
|
export VERSION PATCHLEVEL SUBLEVEL KERNELRELEASE KERNELVERSION
|
2007-11-17 15:37:31 +01:00
|
|
|
export ARCH SRCARCH CONFIG_SHELL HOSTCC HOSTCFLAGS CROSS_COMPILE AS LD CC
|
2009-07-20 21:37:11 +02:00
|
|
|
export CPP AR NM STRIP OBJCOPY OBJDUMP
|
2014-07-18 06:40:11 +02:00
|
|
|
export MAKE AWK GENKSYMS INSTALLKERNEL PERL PYTHON UTS_MACHINE
|
2006-06-25 00:07:55 +02:00
|
|
|
export HOSTCXX HOSTCXXFLAGS LDFLAGS_MODULE CHECK CHECKFLAGS
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2007-10-15 22:17:25 +02:00
|
|
|
export KBUILD_CPPFLAGS NOSTDINC_FLAGS LINUXINCLUDE OBJCOPYFLAGS LDFLAGS
|
kasan: add kernel address sanitizer infrastructure
Kernel Address sanitizer (KASan) is a dynamic memory error detector. It
provides fast and comprehensive solution for finding use-after-free and
out-of-bounds bugs.
KASAN uses compile-time instrumentation for checking every memory access,
therefore GCC > v4.9.2 required. v4.9.2 almost works, but has issues with
putting symbol aliases into the wrong section, which breaks kasan
instrumentation of globals.
This patch only adds infrastructure for kernel address sanitizer. It's
not available for use yet. The idea and some code was borrowed from [1].
Basic idea:
The main idea of KASAN is to use shadow memory to record whether each byte
of memory is safe to access or not, and use compiler's instrumentation to
check the shadow memory on each memory access.
Address sanitizer uses 1/8 of the memory addressable in kernel for shadow
memory and uses direct mapping with a scale and offset to translate a
memory address to its corresponding shadow address.
Here is function to translate address to corresponding shadow address:
unsigned long kasan_mem_to_shadow(unsigned long addr)
{
return (addr >> KASAN_SHADOW_SCALE_SHIFT) + KASAN_SHADOW_OFFSET;
}
where KASAN_SHADOW_SCALE_SHIFT = 3.
So for every 8 bytes there is one corresponding byte of shadow memory.
The following encoding used for each shadow byte: 0 means that all 8 bytes
of the corresponding memory region are valid for access; k (1 <= k <= 7)
means that the first k bytes are valid for access, and other (8 - k) bytes
are not; Any negative value indicates that the entire 8-bytes are
inaccessible. Different negative values used to distinguish between
different kinds of inaccessible memory (redzones, freed memory) (see
mm/kasan/kasan.h).
To be able to detect accesses to bad memory we need a special compiler.
Such compiler inserts a specific function calls (__asan_load*(addr),
__asan_store*(addr)) before each memory access of size 1, 2, 4, 8 or 16.
These functions check whether memory region is valid to access or not by
checking corresponding shadow memory. If access is not valid an error
printed.
Historical background of the address sanitizer from Dmitry Vyukov:
"We've developed the set of tools, AddressSanitizer (Asan),
ThreadSanitizer and MemorySanitizer, for user space. We actively use
them for testing inside of Google (continuous testing, fuzzing,
running prod services). To date the tools have found more than 10'000
scary bugs in Chromium, Google internal codebase and various
open-source projects (Firefox, OpenSSL, gcc, clang, ffmpeg, MySQL and
lots of others): [2] [3] [4].
The tools are part of both gcc and clang compilers.
We have not yet done massive testing under the Kernel AddressSanitizer
(it's kind of chicken and egg problem, you need it to be upstream to
start applying it extensively). To date it has found about 50 bugs.
Bugs that we've found in upstream kernel are listed in [5].
We've also found ~20 bugs in out internal version of the kernel. Also
people from Samsung and Oracle have found some.
[...]
As others noted, the main feature of AddressSanitizer is its
performance due to inline compiler instrumentation and simple linear
shadow memory. User-space Asan has ~2x slowdown on computational
programs and ~2x memory consumption increase. Taking into account that
kernel usually consumes only small fraction of CPU and memory when
running real user-space programs, I would expect that kernel Asan will
have ~10-30% slowdown and similar memory consumption increase (when we
finish all tuning).
I agree that Asan can well replace kmemcheck. We have plans to start
working on Kernel MemorySanitizer that finds uses of unitialized
memory. Asan+Msan will provide feature-parity with kmemcheck. As
others noted, Asan will unlikely replace debug slab and pagealloc that
can be enabled at runtime. Asan uses compiler instrumentation, so even
if it is disabled, it still incurs visible overheads.
Asan technology is easily portable to other architectures. Compiler
instrumentation is fully portable. Runtime has some arch-dependent
parts like shadow mapping and atomic operation interception. They are
relatively easy to port."
Comparison with other debugging features:
========================================
KMEMCHECK:
- KASan can do almost everything that kmemcheck can. KASan uses
compile-time instrumentation, which makes it significantly faster than
kmemcheck. The only advantage of kmemcheck over KASan is detection of
uninitialized memory reads.
Some brief performance testing showed that kasan could be
x500-x600 times faster than kmemcheck:
$ netperf -l 30
MIGRATED TCP STREAM TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to localhost (127.0.0.1) port 0 AF_INET
Recv Send Send
Socket Socket Message Elapsed
Size Size Size Time Throughput
bytes bytes bytes secs. 10^6bits/sec
no debug: 87380 16384 16384 30.00 41624.72
kasan inline: 87380 16384 16384 30.00 12870.54
kasan outline: 87380 16384 16384 30.00 10586.39
kmemcheck: 87380 16384 16384 30.03 20.23
- Also kmemcheck couldn't work on several CPUs. It always sets
number of CPUs to 1. KASan doesn't have such limitation.
DEBUG_PAGEALLOC:
- KASan is slower than DEBUG_PAGEALLOC, but KASan works on sub-page
granularity level, so it able to find more bugs.
SLUB_DEBUG (poisoning, redzones):
- SLUB_DEBUG has lower overhead than KASan.
- SLUB_DEBUG in most cases are not able to detect bad reads,
KASan able to detect both reads and writes.
- In some cases (e.g. redzone overwritten) SLUB_DEBUG detect
bugs only on allocation/freeing of object. KASan catch
bugs right before it will happen, so we always know exact
place of first bad read/write.
[1] https://code.google.com/p/address-sanitizer/wiki/AddressSanitizerForKernel
[2] https://code.google.com/p/address-sanitizer/wiki/FoundBugs
[3] https://code.google.com/p/thread-sanitizer/wiki/FoundBugs
[4] https://code.google.com/p/memory-sanitizer/wiki/FoundBugs
[5] https://code.google.com/p/address-sanitizer/wiki/AddressSanitizerForKernel#Trophies
Based on work by Andrey Konovalov.
Signed-off-by: Andrey Ryabinin <a.ryabinin@samsung.com>
Acked-by: Michal Marek <mmarek@suse.cz>
Signed-off-by: Andrey Konovalov <adech.fo@gmail.com>
Cc: Dmitry Vyukov <dvyukov@google.com>
Cc: Konstantin Serebryany <kcc@google.com>
Cc: Dmitry Chernenkov <dmitryc@google.com>
Cc: Yuri Gribov <tetra2005@gmail.com>
Cc: Konstantin Khlebnikov <koct9i@gmail.com>
Cc: Sasha Levin <sasha.levin@oracle.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Joonsoo Kim <iamjoonsoo.kim@lge.com>
Cc: Dave Hansen <dave.hansen@intel.com>
Cc: Andi Kleen <andi@firstfloor.org>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Pekka Enberg <penberg@kernel.org>
Cc: David Rientjes <rientjes@google.com>
Cc: Stephen Rothwell <sfr@canb.auug.org.au>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2015-02-13 23:39:17 +01:00
|
|
|
export KBUILD_CFLAGS CFLAGS_KERNEL CFLAGS_MODULE CFLAGS_GCOV CFLAGS_KASAN
|
2007-10-15 21:59:31 +02:00
|
|
|
export KBUILD_AFLAGS AFLAGS_KERNEL AFLAGS_MODULE
|
kbuild: allow assignment to {A,C,LD}FLAGS_MODULE on the command line
It is now possible to assign options to AS, CC and LD
on the command line - which is only used when building modules.
{A,C,LD}FLAGS_MODULE was all used both in the top-level Makefile
in the arch makefiles, thus users had no way to specify
additional options to AS, CC, LD when building modules
without overriding the original value.
Introduce a new set of variables KBUILD_{A,C,LD}FLAGS_MODULE
that is used by arch specific files and free up
{A,C,LD}FLAGS_MODULE so they can be assigned on
the command line.
All arch Makefiles that used the old variables has been updated.
Note: Previously we had a MODFLAGS variable for both
AS and CC. But in favour of consistency this was dropped.
So in some cases arch Makefile has one assignmnet replaced by
two assignmnets.
Note2: MODFLAGS was not documented and is dropped
without any notice. I do not expect much/any breakage
from this.
Signed-off-by: Sam Ravnborg <sam@ravnborg.org>
Cc: Denys Vlasenko <vda.linux@googlemail.com>
Cc: Haavard Skinnemoen <hskinnemoen@atmel.com>
Cc: Mike Frysinger <vapier@gentoo.org>
Cc: Tony Luck <tony.luck@intel.com>
Cc: Geert Uytterhoeven <geert@linux-m68k.org>
Cc: Ralf Baechle <ralf@linux-mips.org>
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Cc: Martin Schwidefsky <schwidefsky@de.ibm.com>
Cc: Chen Liqin <liqin.chen@sunplusct.com>
Acked-by: Mike Frysinger <vapier@gentoo.org> [blackfin]
Acked-by: Haavard Skinnemoen <haavard.skinnemoen@atmel.com> [avr32]
Signed-off-by: Michal Marek <mmarek@suse.cz>
2010-07-28 17:33:09 +02:00
|
|
|
export KBUILD_AFLAGS_MODULE KBUILD_CFLAGS_MODULE KBUILD_LDFLAGS_MODULE
|
2010-07-28 19:11:27 +02:00
|
|
|
export KBUILD_AFLAGS_KERNEL KBUILD_CFLAGS_KERNEL
|
2011-04-20 13:45:30 +02:00
|
|
|
export KBUILD_ARFLAGS
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# When compiling out-of-tree modules, put MODVERDIR in the module
|
|
|
|
# tree rather than in the kernel tree. The kernel tree might
|
|
|
|
# even be read-only.
|
|
|
|
export MODVERDIR := $(if $(KBUILD_EXTMOD),$(firstword $(KBUILD_EXTMOD))/).tmp_versions
|
|
|
|
|
|
|
|
# Files to ignore in find ... statements
|
|
|
|
|
2014-02-06 13:51:42 +01:00
|
|
|
export RCS_FIND_IGNORE := \( -name SCCS -o -name BitKeeper -o -name .svn -o \
|
|
|
|
-name CVS -o -name .pc -o -name .hg -o -name .git \) \
|
|
|
|
-prune -o
|
2012-02-16 22:49:15 +01:00
|
|
|
export RCS_TAR_IGNORE := --exclude SCCS --exclude BitKeeper --exclude .svn \
|
|
|
|
--exclude CVS --exclude .pc --exclude .hg --exclude .git
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# ===========================================================================
|
|
|
|
# Rules shared between *config targets and build targets
|
|
|
|
|
|
|
|
# Basic helpers built in scripts/
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += scripts_basic
|
2005-04-17 00:20:36 +02:00
|
|
|
scripts_basic:
|
|
|
|
$(Q)$(MAKE) $(build)=scripts/basic
|
2009-11-17 16:48:25 +01:00
|
|
|
$(Q)rm -f .tmp_quiet_recordmcount
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2005-09-06 11:47:04 +02:00
|
|
|
# To avoid any implicit rule to kick in, define an empty command.
|
|
|
|
scripts/basic/%: scripts_basic ;
|
|
|
|
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += outputmakefile
|
2006-05-02 12:33:20 +02:00
|
|
|
# outputmakefile generates a Makefile in the output directory, if using a
|
|
|
|
# separate output directory. This allows convenient use of make in the
|
|
|
|
# output directory.
|
2005-04-17 00:20:36 +02:00
|
|
|
outputmakefile:
|
2006-05-02 12:33:20 +02:00
|
|
|
ifneq ($(KBUILD_SRC),)
|
2009-01-10 04:56:13 +01:00
|
|
|
$(Q)ln -fsn $(srctree) source
|
2006-05-02 12:33:20 +02:00
|
|
|
$(Q)$(CONFIG_SHELL) $(srctree)/scripts/mkmakefile \
|
|
|
|
$(srctree) $(objtree) $(VERSION) $(PATCHLEVEL)
|
|
|
|
endif
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2011-04-27 22:29:49 +02:00
|
|
|
# Support for using generic headers in asm-generic
|
|
|
|
PHONY += asm-generic
|
|
|
|
asm-generic:
|
|
|
|
$(Q)$(MAKE) -f $(srctree)/scripts/Makefile.asm-generic \
|
2012-10-17 13:25:44 +02:00
|
|
|
src=asm obj=arch/$(SRCARCH)/include/generated/asm
|
|
|
|
$(Q)$(MAKE) -f $(srctree)/scripts/Makefile.asm-generic \
|
|
|
|
src=uapi/asm obj=arch/$(SRCARCH)/include/generated/uapi/asm
|
2011-04-27 22:29:49 +02:00
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
# To make sure we do not include .config for any of the *config targets
|
|
|
|
# catch them early, and hand them over to scripts/kconfig/Makefile
|
|
|
|
# It is allowed to specify more targets when calling make, including
|
|
|
|
# mixing *config targets and build targets.
|
2006-06-25 00:07:55 +02:00
|
|
|
# For example 'make oldconfig all'.
|
2005-04-17 00:20:36 +02:00
|
|
|
# Detect when mixed targets is specified, and make a second invocation
|
|
|
|
# of make so .config is not included in this case either (for *config).
|
|
|
|
|
2012-10-02 19:01:57 +02:00
|
|
|
version_h := include/generated/uapi/linux/version.h
|
2014-11-27 16:13:17 +01:00
|
|
|
old_version_h := include/linux/version.h
|
2012-10-02 19:01:56 +02:00
|
|
|
|
2007-01-10 14:45:28 +01:00
|
|
|
no-dot-config-targets := clean mrproper distclean \
|
2014-11-28 13:31:43 +01:00
|
|
|
cscope gtags TAGS tags help% %docs check% coccicheck \
|
2012-10-02 19:01:56 +02:00
|
|
|
$(version_h) headers_% archheaders archscripts \
|
Merge branch 'perf-core-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/linux-2.6-tip
* 'perf-core-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/linux-2.6-tip: (162 commits)
tracing/kprobes: unregister_trace_probe needs to be called under mutex
perf: expose event__process function
perf events: Fix mmap offset determination
perf, powerpc: fsl_emb: Restore setting perf_sample_data.period
perf, powerpc: Convert the FSL driver to use local64_t
perf tools: Don't keep unreferenced maps when unmaps are detected
perf session: Invalidate last_match when removing threads from rb_tree
perf session: Free the ref_reloc_sym memory at the right place
x86,mmiotrace: Add support for tracing STOS instruction
perf, sched migration: Librarize task states and event headers helpers
perf, sched migration: Librarize the GUI class
perf, sched migration: Make the GUI class client agnostic
perf, sched migration: Make it vertically scrollable
perf, sched migration: Parameterize cpu height and spacing
perf, sched migration: Fix key bindings
perf, sched migration: Ignore unhandled task states
perf, sched migration: Handle ignored migrate out events
perf: New migration tool overview
tracing: Drop cpparg() macro
perf: Use tracepoint_synchronize_unregister() to flush any pending tracepoint call
...
Fix up trivial conflicts in Makefile and drivers/cpufreq/cpufreq.c
2010-08-06 18:30:52 +02:00
|
|
|
kernelversion %src-pkg
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
config-targets := 0
|
|
|
|
mixed-targets := 0
|
|
|
|
dot-config := 1
|
|
|
|
|
|
|
|
ifneq ($(filter $(no-dot-config-targets), $(MAKECMDGOALS)),)
|
|
|
|
ifeq ($(filter-out $(no-dot-config-targets), $(MAKECMDGOALS)),)
|
|
|
|
dot-config := 0
|
|
|
|
endif
|
|
|
|
endif
|
|
|
|
|
|
|
|
ifeq ($(KBUILD_EXTMOD),)
|
|
|
|
ifneq ($(filter config %config,$(MAKECMDGOALS)),)
|
|
|
|
config-targets := 1
|
2014-12-11 11:12:34 +01:00
|
|
|
ifneq ($(words $(MAKECMDGOALS)),1)
|
2005-04-17 00:20:36 +02:00
|
|
|
mixed-targets := 1
|
|
|
|
endif
|
|
|
|
endif
|
|
|
|
endif
|
|
|
|
|
|
|
|
ifeq ($(mixed-targets),1)
|
|
|
|
# ===========================================================================
|
|
|
|
# We're called with mixed targets (*config and build targets).
|
|
|
|
# Handle them one by one.
|
|
|
|
|
2014-04-09 08:51:35 +02:00
|
|
|
PHONY += $(MAKECMDGOALS) __build_one_by_one
|
|
|
|
|
|
|
|
$(filter-out __build_one_by_one, $(MAKECMDGOALS)): __build_one_by_one
|
|
|
|
@:
|
|
|
|
|
|
|
|
__build_one_by_one:
|
|
|
|
$(Q)set -e; \
|
|
|
|
for i in $(MAKECMDGOALS); do \
|
|
|
|
$(MAKE) -f $(srctree)/Makefile $$i; \
|
|
|
|
done
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
else
|
|
|
|
ifeq ($(config-targets),1)
|
|
|
|
# ===========================================================================
|
|
|
|
# *config targets only - make sure prerequisites are updated, and descend
|
|
|
|
# in scripts/kconfig to make the *config target
|
|
|
|
|
|
|
|
# Read arch specific Makefile to set KBUILD_DEFCONFIG as needed.
|
|
|
|
# KBUILD_DEFCONFIG may point out an alternative default configuration
|
|
|
|
# used for 'make defconfig'
|
2007-10-25 19:42:04 +02:00
|
|
|
include $(srctree)/arch/$(SRCARCH)/Makefile
|
2008-08-25 10:51:27 +02:00
|
|
|
export KBUILD_DEFCONFIG KBUILD_KCONFIG
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2008-12-13 23:00:45 +01:00
|
|
|
config: scripts_basic outputmakefile FORCE
|
|
|
|
$(Q)$(MAKE) $(build)=scripts/kconfig $@
|
|
|
|
|
|
|
|
%config: scripts_basic outputmakefile FORCE
|
2005-04-17 00:20:36 +02:00
|
|
|
$(Q)$(MAKE) $(build)=scripts/kconfig $@
|
|
|
|
|
|
|
|
else
|
|
|
|
# ===========================================================================
|
|
|
|
# Build targets only - this includes vmlinux, arch specific targets, clean
|
|
|
|
# targets and others. In general all targets except *config targets.
|
|
|
|
|
|
|
|
ifeq ($(KBUILD_EXTMOD),)
|
|
|
|
# Additional helpers built in scripts/
|
|
|
|
# Carefully list dependencies so we do not try to build scripts twice
|
2006-06-25 00:07:55 +02:00
|
|
|
# in parallel
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += scripts
|
2013-04-09 19:57:00 +02:00
|
|
|
scripts: scripts_basic include/config/auto.conf include/config/tristate.conf \
|
|
|
|
asm-generic
|
2005-04-17 00:20:36 +02:00
|
|
|
$(Q)$(MAKE) $(build)=$(@)
|
|
|
|
|
|
|
|
# Objects we will link into vmlinux / subdirs we need to visit
|
|
|
|
init-y := init/
|
2008-05-23 14:58:12 +02:00
|
|
|
drivers-y := drivers/ sound/ firmware/
|
2005-04-17 00:20:36 +02:00
|
|
|
net-y := net/
|
|
|
|
libs-y := lib/
|
|
|
|
core-y := usr/
|
|
|
|
endif # KBUILD_EXTMOD
|
|
|
|
|
|
|
|
ifeq ($(dot-config),1)
|
2006-08-07 21:01:36 +02:00
|
|
|
# Read in config
|
|
|
|
-include include/config/auto.conf
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2006-08-07 21:01:36 +02:00
|
|
|
ifeq ($(KBUILD_EXTMOD),)
|
2005-04-17 00:20:36 +02:00
|
|
|
# Read in dependencies to all Kconfig* files, make sure to run
|
|
|
|
# oldconfig if changes are detected.
|
2006-06-09 07:12:39 +02:00
|
|
|
-include include/config/auto.conf.cmd
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# To avoid any implicit rule to kick in, define an empty command
|
2006-06-09 07:12:51 +02:00
|
|
|
$(KCONFIG_CONFIG) include/config/auto.conf.cmd: ;
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2006-06-09 07:12:39 +02:00
|
|
|
# If .config is newer than include/config/auto.conf, someone tinkered
|
2005-12-26 23:34:03 +01:00
|
|
|
# with it and forgot to run make oldconfig.
|
2006-06-25 00:07:55 +02:00
|
|
|
# if auto.conf.cmd is missing then we are probably in a cleaned tree so
|
2005-12-26 23:34:03 +01:00
|
|
|
# we execute the config step to be sure to catch updated Kconfig files
|
2009-12-07 16:38:33 +01:00
|
|
|
include/config/%.conf: $(KCONFIG_CONFIG) include/config/auto.conf.cmd
|
2005-04-17 00:20:36 +02:00
|
|
|
$(Q)$(MAKE) -f $(srctree)/Makefile silentoldconfig
|
2006-06-19 06:09:09 +02:00
|
|
|
else
|
2009-10-18 00:49:24 +02:00
|
|
|
# external modules needs include/generated/autoconf.h and include/config/auto.conf
|
2006-08-07 21:01:36 +02:00
|
|
|
# but do not care if they are up-to-date. Use auto.conf to trigger the test
|
|
|
|
PHONY += include/config/auto.conf
|
|
|
|
|
|
|
|
include/config/auto.conf:
|
2009-10-18 00:49:24 +02:00
|
|
|
$(Q)test -e include/generated/autoconf.h -a -e $@ || ( \
|
2012-07-07 23:04:40 +02:00
|
|
|
echo >&2; \
|
|
|
|
echo >&2 " ERROR: Kernel configuration is invalid."; \
|
|
|
|
echo >&2 " include/generated/autoconf.h or $@ are missing.";\
|
|
|
|
echo >&2 " Run 'make oldconfig && make prepare' on kernel src to fix it."; \
|
|
|
|
echo >&2 ; \
|
2006-08-07 21:01:36 +02:00
|
|
|
/bin/false)
|
|
|
|
|
|
|
|
endif # KBUILD_EXTMOD
|
2006-06-09 07:12:39 +02:00
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
else
|
|
|
|
# Dummy target needed, because used as prerequisite
|
2006-06-09 07:12:39 +02:00
|
|
|
include/config/auto.conf: ;
|
2006-08-07 21:01:36 +02:00
|
|
|
endif # $(dot-config)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# The all: target is the default when no target is given on the
|
|
|
|
# command line.
|
|
|
|
# This allow a user to issue only 'make' to build a kernel including modules
|
2010-06-03 10:54:58 +02:00
|
|
|
# Defaults to vmlinux, but the arch makefile usually adds further targets
|
2005-04-17 00:20:36 +02:00
|
|
|
all: vmlinux
|
|
|
|
|
Makefile: Fix unrecognized cross-compiler command line options
On architectures that setup CROSS_COMPILE in their arch/*/Makefile
(arc, blackfin, m68k, mips, parisc, score, sh, tile, unicore32, xtensa),
cc-option and cc-disable-warning may check against the wrong compiler,
causing errors like
cc1: error: unrecognized command line option "-Wno-maybe-uninitialized"
if the host gcc supports a compiler option, while the cross compiler
doesn't support that option.
Move all logic using cc-option or cc-disable-warning below the inclusion
of the arch's Makefile to fix this.
Introduced by
- commit e74fc973b6e531fef1fce8b101ffff05ecfb774c ("Turn off
-Wmaybe-uninitialized when building with -Os"),
- commit 61163efae02040f66a95c8ed17f4407951ba58fa ("kbuild: LLVMLinux:
Add Kbuild support for building kernel with Clang").
As -Wno-maybe-uninitialized requires a quite recent gcc (gcc 4.6.3 on
Ubuntu 12.04 LTS doesn't support it), this only showed up recently (gcc
4.8.2 on Ubuntu 14.04 LTS does support it).
Signed-off-by: Geert Uytterhoeven <geert@linux-m68k.org>
Signed-off-by: Michal Marek <mmarek@suse.cz>
2014-05-27 09:54:12 +02:00
|
|
|
include $(srctree)/arch/$(SRCARCH)/Makefile
|
|
|
|
|
|
|
|
KBUILD_CFLAGS += $(call cc-option,-fno-delete-null-pointer-checks,)
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
ifdef CONFIG_CC_OPTIMIZE_FOR_SIZE
|
2013-02-15 21:23:58 +01:00
|
|
|
KBUILD_CFLAGS += -Os $(call cc-disable-warning,maybe-uninitialized,)
|
2005-04-17 00:20:36 +02:00
|
|
|
else
|
2007-10-14 22:21:35 +02:00
|
|
|
KBUILD_CFLAGS += -O2
|
2005-04-17 00:20:36 +02:00
|
|
|
endif
|
|
|
|
|
./Makefile: tell gcc optimizer to never introduce new data races
We have been chasing a memory corruption bug, which turned out to be
caused by very old gcc (4.3.4), which happily turned conditional load
into a non-conditional one, and that broke correctness (the condition
was met only if lock was held) and corrupted memory.
This particular problem with that particular code did not happen when
never gccs were used. I've brought this up with our gcc folks, as I
wanted to make sure that this can't really happen again, and it turns
out it actually can.
Quoting Martin Jambor <mjambor@suse.cz>:
"More current GCCs are more careful when it comes to replacing a
conditional load with a non-conditional one, most notably they check
that a store happens in each iteration of _a_ loop but they assume
loops are executed. They also perform a simple check whether the
store cannot trap which currently passes only for non-const
variables. A simple testcase demonstrating it on an x86_64 is for
example the following:
$ cat cond_store.c
int g_1 = 1;
int g_2[1024] __attribute__((section ("safe_section"), aligned (4096)));
int c = 4;
int __attribute__ ((noinline))
foo (void)
{
int l;
for (l = 0; (l != 4); l++) {
if (g_1)
return l;
for (g_2[0] = 0; (g_2[0] >= 26); ++g_2[0])
;
}
return 2;
}
int main (int argc, char* argv[])
{
if (mprotect (g_2, sizeof(g_2), PROT_READ) == -1)
{
int e = errno;
error (e, e, "mprotect error %i", e);
}
foo ();
__builtin_printf("OK\n");
return 0;
}
/* EOF */
$ ~/gcc/trunk/inst/bin/gcc cond_store.c -O2 --param allow-store-data-races=0
$ ./a.out
OK
$ ~/gcc/trunk/inst/bin/gcc cond_store.c -O2 --param allow-store-data-races=1
$ ./a.out
Segmentation fault
The testcase fails the same at least with 4.9, 4.8 and 4.7. Therefore
I would suggest building kernels with this parameter set to zero. I
also agree with Jikos that the default should be changed for -O2. I
have run most of the SPEC 2k6 CPU benchmarks (gamess and dealII
failed, at -O2, not sure why) compiled with and without this option
and did not see any real difference between respective run-times"
Hopefully the default will be changed in newer gccs, but let's force it
for kernel builds so that we are on a safe side even when older gcc are
used.
The code in question was out-of-tree printk-in-NMI (yeah, surprise
suprise, once again) patch written by Petr Mladek, let me quote his
comment from our internal bugzilla:
"I have spent few days investigating inconsistent state of kernel ring buffer.
It went out that it was caused by speculative store generated by
gcc-4.3.4.
The problem is in assembly generated for make_free_space(). The functions is
called the following way:
+ vprintk_emit();
+ log = MAIN_LOG; // with logbuf_lock
or
log = NMI_LOG; // with nmi_logbuf_lock
cont_add(log, ...);
+ cont_flush(log, ...);
+ log_store(log, ...);
+ log_make_free_space(log, ...);
If called with log = NMI_LOG then only nmi_log_* global variables are safe to
modify but the generated code does store also into (main_)log_* global
variables:
<log_make_free_space>:
55 push %rbp
89 f6 mov %esi,%esi
48 8b 05 03 99 51 01 mov 0x1519903(%rip),%rax # ffffffff82620868 <nmi_log_next_id>
44 8b 1d ec 98 51 01 mov 0x15198ec(%rip),%r11d # ffffffff82620858 <log_next_idx>
8b 35 36 60 14 01 mov 0x1146036(%rip),%esi # ffffffff8224cfa8 <log_buf_len>
44 8b 35 33 60 14 01 mov 0x1146033(%rip),%r14d # ffffffff8224cfac <nmi_log_buf_len>
4c 8b 2d d0 98 51 01 mov 0x15198d0(%rip),%r13 # ffffffff82620850 <log_next_seq>
4c 8b 25 11 61 14 01 mov 0x1146111(%rip),%r12 # ffffffff8224d098 <log_buf>
49 89 c2 mov %rax,%r10
48 21 c2 and %rax,%rdx
48 8b 1d 0c 99 55 01 mov 0x155990c(%rip),%rbx # ffffffff826608a0 <nmi_log_buf>
49 c1 ea 20 shr $0x20,%r10
48 89 55 d0 mov %rdx,-0x30(%rbp)
44 29 de sub %r11d,%esi
45 29 d6 sub %r10d,%r14d
4c 8b 0d 97 98 51 01 mov 0x1519897(%rip),%r9 # ffffffff82620840 <log_first_seq>
eb 7e jmp ffffffff81107029 <log_make_free_space+0xe9>
[...]
85 ff test %edi,%edi # edi = 1 for NMI_LOG
4c 89 e8 mov %r13,%rax
4c 89 ca mov %r9,%rdx
74 0a je ffffffff8110703d <log_make_free_space+0xfd>
8b 15 27 98 51 01 mov 0x1519827(%rip),%edx # ffffffff82620860 <nmi_log_first_id>
48 8b 45 d0 mov -0x30(%rbp),%rax
48 39 c2 cmp %rax,%rdx # end of loop
0f 84 da 00 00 00 je ffffffff81107120 <log_make_free_space+0x1e0>
[...]
85 ff test %edi,%edi # edi = 1 for NMI_LOG
4c 89 0d 17 97 51 01 mov %r9,0x1519717(%rip) # ffffffff82620840 <log_first_seq>
^^^^^^^^^^^^^^^^^^^^^^^^^^
KABOOOM
74 35 je ffffffff81107160 <log_make_free_space+0x220>
It stores log_first_seq when edi == NMI_LOG. This instructions are used also
when edi == MAIN_LOG but the store is done speculatively before the condition
is decided. It is unsafe because we do not have "logbuf_lock" in NMI context
and some other process migh modify "log_first_seq" in parallel"
I believe that the best course of action is both
- building kernel (and anything multi-threaded, I guess) with that
optimization turned off
- persuade gcc folks to change the default for future releases
Signed-off-by: Jiri Kosina <jkosina@suse.cz>
Cc: Martin Jambor <mjambor@suse.cz>
Cc: Petr Mladek <pmladek@suse.cz>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Marek Polacek <polacek@redhat.com>
Cc: Jakub Jelinek <jakub@redhat.com>
Cc: Steven Noonan <steven@uplinklabs.net>
Cc: Richard Biener <richard.guenther@gmail.com>
Cc: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2014-08-07 01:08:43 +02:00
|
|
|
# Tell gcc to never replace conditional load with a non-conditional one
|
|
|
|
KBUILD_CFLAGS += $(call cc-option,--param=allow-store-data-races=0)
|
|
|
|
|
2012-03-28 20:51:18 +02:00
|
|
|
ifdef CONFIG_READABLE_ASM
|
|
|
|
# Disable optimizations that make assembler listings hard to read.
|
|
|
|
# reorder blocks reorders the control in the function
|
|
|
|
# ipa clone creates specialized cloned functions
|
|
|
|
# partial inlining inlines only parts of functions
|
|
|
|
KBUILD_CFLAGS += $(call cc-option,-fno-reorder-blocks,) \
|
|
|
|
$(call cc-option,-fno-ipa-cp-clone,) \
|
|
|
|
$(call cc-option,-fno-partial-inlining)
|
|
|
|
endif
|
|
|
|
|
2009-06-05 01:29:08 +02:00
|
|
|
ifneq ($(CONFIG_FRAME_WARN),0)
|
2008-02-22 15:15:03 +01:00
|
|
|
KBUILD_CFLAGS += $(call cc-option,-Wframe-larger-than=${CONFIG_FRAME_WARN})
|
|
|
|
endif
|
|
|
|
|
2013-12-19 20:35:58 +01:00
|
|
|
# Handle stack protector mode.
|
2014-08-07 01:03:31 +02:00
|
|
|
#
|
|
|
|
# Since kbuild can potentially perform two passes (first with the old
|
|
|
|
# .config values and then with updated .config values), we cannot error out
|
|
|
|
# if a desired compiler option is unsupported. If we were to error, kbuild
|
|
|
|
# could never get to the second pass and actually notice that we changed
|
|
|
|
# the option to something that was supported.
|
|
|
|
#
|
|
|
|
# Additionally, we don't want to fallback and/or silently change which compiler
|
|
|
|
# flags will be used, since that leads to producing kernels with different
|
|
|
|
# security feature characteristics depending on the compiler used. ("But I
|
|
|
|
# selected CC_STACKPROTECTOR_STRONG! Why did it build with _REGULAR?!")
|
|
|
|
#
|
|
|
|
# The middle ground is to warn here so that the failed option is obvious, but
|
|
|
|
# to let the build fail with bad compiler flags so that we can't produce a
|
|
|
|
# kernel when there is a CONFIG and compiler mismatch.
|
|
|
|
#
|
stackprotector: Introduce CONFIG_CC_STACKPROTECTOR_STRONG
This changes the stack protector config option into a choice of
"None", "Regular", and "Strong":
CONFIG_CC_STACKPROTECTOR_NONE
CONFIG_CC_STACKPROTECTOR_REGULAR
CONFIG_CC_STACKPROTECTOR_STRONG
"Regular" means the old CONFIG_CC_STACKPROTECTOR=y option.
"Strong" is a new mode introduced by this patch. With "Strong" the
kernel is built with -fstack-protector-strong (available in
gcc 4.9 and later). This option increases the coverage of the stack
protector without the heavy performance hit of -fstack-protector-all.
For reference, the stack protector options available in gcc are:
-fstack-protector-all:
Adds the stack-canary saving prefix and stack-canary checking
suffix to _all_ function entry and exit. Results in substantial
use of stack space for saving the canary for deep stack users
(e.g. historically xfs), and measurable (though shockingly still
low) performance hit due to all the saving/checking. Really not
suitable for sane systems, and was entirely removed as an option
from the kernel many years ago.
-fstack-protector:
Adds the canary save/check to functions that define an 8
(--param=ssp-buffer-size=N, N=8 by default) or more byte local
char array. Traditionally, stack overflows happened with
string-based manipulations, so this was a way to find those
functions. Very few total functions actually get the canary; no
measurable performance or size overhead.
-fstack-protector-strong
Adds the canary for a wider set of functions, since it's not
just those with strings that have ultimately been vulnerable to
stack-busting. With this superset, more functions end up with a
canary, but it still remains small compared to all functions
with only a small change in performance. Based on the original
design document, a function gets the canary when it contains any
of:
- local variable's address used as part of the right hand side
of an assignment or function argument
- local variable is an array (or union containing an array),
regardless of array type or length
- uses register local variables
https://docs.google.com/a/google.com/document/d/1xXBH6rRZue4f296vGt9YQcuLVQHeE516stHwt8M9xyU
Find below a comparison of "size" and "objdump" output when built with
gcc-4.9 in three configurations:
- defconfig
11430641 kernel text size
36110 function bodies
- defconfig + CONFIG_CC_STACKPROTECTOR_REGULAR
11468490 kernel text size (+0.33%)
1015 of 36110 functions are stack-protected (2.81%)
- defconfig + CONFIG_CC_STACKPROTECTOR_STRONG via this patch
11692790 kernel text size (+2.24%)
7401 of 36110 functions are stack-protected (20.5%)
With -strong, ARM's compressed boot code now triggers stack
protection, so a static guard was added. Since this is only used
during decompression and was never used before, the exposure
here is very small. Once it switches to the full kernel, the
stack guard is back to normal.
Chrome OS has been using -fstack-protector-strong for its kernel
builds for the last 8 months with no problems.
Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: Arjan van de Ven <arjan@linux.intel.com>
Cc: Michal Marek <mmarek@suse.cz>
Cc: Russell King <linux@arm.linux.org.uk>
Cc: Ralf Baechle <ralf@linux-mips.org>
Cc: Paul Mundt <lethal@linux-sh.org>
Cc: James Hogan <james.hogan@imgtec.com>
Cc: Stephen Rothwell <sfr@canb.auug.org.au>
Cc: Shawn Guo <shawn.guo@linaro.org>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: linux-arm-kernel@lists.infradead.org
Cc: linux-mips@linux-mips.org
Cc: linux-arch@vger.kernel.org
Link: http://lkml.kernel.org/r/1387481759-14535-3-git-send-email-keescook@chromium.org
[ Improved the changelog and descriptions some more. ]
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2013-12-19 20:35:59 +01:00
|
|
|
ifdef CONFIG_CC_STACKPROTECTOR_REGULAR
|
2013-12-19 20:35:58 +01:00
|
|
|
stackp-flag := -fstack-protector
|
|
|
|
ifeq ($(call cc-option, $(stackp-flag)),)
|
2014-02-26 00:01:48 +01:00
|
|
|
$(warning Cannot use CONFIG_CC_STACKPROTECTOR_REGULAR: \
|
2014-02-26 00:01:46 +01:00
|
|
|
-fstack-protector not supported by compiler)
|
2013-12-19 20:35:58 +01:00
|
|
|
endif
|
2014-02-26 00:01:48 +01:00
|
|
|
else
|
|
|
|
ifdef CONFIG_CC_STACKPROTECTOR_STRONG
|
stackprotector: Introduce CONFIG_CC_STACKPROTECTOR_STRONG
This changes the stack protector config option into a choice of
"None", "Regular", and "Strong":
CONFIG_CC_STACKPROTECTOR_NONE
CONFIG_CC_STACKPROTECTOR_REGULAR
CONFIG_CC_STACKPROTECTOR_STRONG
"Regular" means the old CONFIG_CC_STACKPROTECTOR=y option.
"Strong" is a new mode introduced by this patch. With "Strong" the
kernel is built with -fstack-protector-strong (available in
gcc 4.9 and later). This option increases the coverage of the stack
protector without the heavy performance hit of -fstack-protector-all.
For reference, the stack protector options available in gcc are:
-fstack-protector-all:
Adds the stack-canary saving prefix and stack-canary checking
suffix to _all_ function entry and exit. Results in substantial
use of stack space for saving the canary for deep stack users
(e.g. historically xfs), and measurable (though shockingly still
low) performance hit due to all the saving/checking. Really not
suitable for sane systems, and was entirely removed as an option
from the kernel many years ago.
-fstack-protector:
Adds the canary save/check to functions that define an 8
(--param=ssp-buffer-size=N, N=8 by default) or more byte local
char array. Traditionally, stack overflows happened with
string-based manipulations, so this was a way to find those
functions. Very few total functions actually get the canary; no
measurable performance or size overhead.
-fstack-protector-strong
Adds the canary for a wider set of functions, since it's not
just those with strings that have ultimately been vulnerable to
stack-busting. With this superset, more functions end up with a
canary, but it still remains small compared to all functions
with only a small change in performance. Based on the original
design document, a function gets the canary when it contains any
of:
- local variable's address used as part of the right hand side
of an assignment or function argument
- local variable is an array (or union containing an array),
regardless of array type or length
- uses register local variables
https://docs.google.com/a/google.com/document/d/1xXBH6rRZue4f296vGt9YQcuLVQHeE516stHwt8M9xyU
Find below a comparison of "size" and "objdump" output when built with
gcc-4.9 in three configurations:
- defconfig
11430641 kernel text size
36110 function bodies
- defconfig + CONFIG_CC_STACKPROTECTOR_REGULAR
11468490 kernel text size (+0.33%)
1015 of 36110 functions are stack-protected (2.81%)
- defconfig + CONFIG_CC_STACKPROTECTOR_STRONG via this patch
11692790 kernel text size (+2.24%)
7401 of 36110 functions are stack-protected (20.5%)
With -strong, ARM's compressed boot code now triggers stack
protection, so a static guard was added. Since this is only used
during decompression and was never used before, the exposure
here is very small. Once it switches to the full kernel, the
stack guard is back to normal.
Chrome OS has been using -fstack-protector-strong for its kernel
builds for the last 8 months with no problems.
Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: Arjan van de Ven <arjan@linux.intel.com>
Cc: Michal Marek <mmarek@suse.cz>
Cc: Russell King <linux@arm.linux.org.uk>
Cc: Ralf Baechle <ralf@linux-mips.org>
Cc: Paul Mundt <lethal@linux-sh.org>
Cc: James Hogan <james.hogan@imgtec.com>
Cc: Stephen Rothwell <sfr@canb.auug.org.au>
Cc: Shawn Guo <shawn.guo@linaro.org>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: linux-arm-kernel@lists.infradead.org
Cc: linux-mips@linux-mips.org
Cc: linux-arch@vger.kernel.org
Link: http://lkml.kernel.org/r/1387481759-14535-3-git-send-email-keescook@chromium.org
[ Improved the changelog and descriptions some more. ]
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2013-12-19 20:35:59 +01:00
|
|
|
stackp-flag := -fstack-protector-strong
|
|
|
|
ifeq ($(call cc-option, $(stackp-flag)),)
|
|
|
|
$(warning Cannot use CONFIG_CC_STACKPROTECTOR_STRONG: \
|
|
|
|
-fstack-protector-strong not supported by compiler)
|
|
|
|
endif
|
2013-12-19 20:35:58 +01:00
|
|
|
else
|
|
|
|
# Force off for distro compilers that enable stack protector by default.
|
|
|
|
stackp-flag := $(call cc-option, -fno-stack-protector)
|
2009-02-09 14:17:39 +01:00
|
|
|
endif
|
2014-02-26 00:01:48 +01:00
|
|
|
endif
|
2013-12-19 20:35:58 +01:00
|
|
|
KBUILD_CFLAGS += $(stackp-flag)
|
2008-02-13 22:43:28 +01:00
|
|
|
|
2013-09-04 04:27:23 +02:00
|
|
|
ifeq ($(COMPILER),clang)
|
|
|
|
KBUILD_CPPFLAGS += $(call cc-option,-Qunused-arguments,)
|
|
|
|
KBUILD_CPPFLAGS += $(call cc-option,-Wno-unknown-warning-option,)
|
|
|
|
KBUILD_CFLAGS += $(call cc-disable-warning, unused-variable)
|
|
|
|
KBUILD_CFLAGS += $(call cc-disable-warning, format-invalid-specifier)
|
|
|
|
KBUILD_CFLAGS += $(call cc-disable-warning, gnu)
|
|
|
|
# Quiet clang warning: comparison of unsigned expression < 0 is always false
|
|
|
|
KBUILD_CFLAGS += $(call cc-disable-warning, tautological-compare)
|
|
|
|
# CLANG uses a _MergedGlobals as optimization, but this breaks modpost, as the
|
|
|
|
# source of a reference will be _MergedGlobals and not on of the whitelisted names.
|
|
|
|
# See modpost pattern 2
|
|
|
|
KBUILD_CFLAGS += $(call cc-option, -mno-global-merge,)
|
2014-08-01 06:08:25 +02:00
|
|
|
KBUILD_CFLAGS += $(call cc-option, -fcatch-undefined-behavior)
|
2013-09-04 04:27:23 +02:00
|
|
|
else
|
|
|
|
|
2011-04-21 23:28:13 +02:00
|
|
|
# This warning generated too much noise in a regular build.
|
|
|
|
# Use make W=1 to enable this warning (see scripts/Makefile.build)
|
2011-05-02 12:51:15 +02:00
|
|
|
KBUILD_CFLAGS += $(call cc-disable-warning, unused-but-set-variable)
|
2013-09-04 04:27:23 +02:00
|
|
|
endif
|
2011-04-21 23:28:13 +02:00
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
ifdef CONFIG_FRAME_POINTER
|
2007-10-14 22:21:35 +02:00
|
|
|
KBUILD_CFLAGS += -fno-omit-frame-pointer -fno-optimize-sibling-calls
|
2005-04-17 00:20:36 +02:00
|
|
|
else
|
2010-08-10 20:20:53 +02:00
|
|
|
# Some targets (ARM with Thumb2, for example), can't be built with frame
|
|
|
|
# pointers. For those, we don't have FUNCTION_TRACER automatically
|
|
|
|
# select FRAME_POINTER. However, FUNCTION_TRACER adds -pg, and this is
|
|
|
|
# incompatible with -fomit-frame-pointer with current GCC, so we don't use
|
|
|
|
# -fomit-frame-pointer with FUNCTION_TRACER.
|
|
|
|
ifndef CONFIG_FUNCTION_TRACER
|
2007-10-14 22:21:35 +02:00
|
|
|
KBUILD_CFLAGS += -fomit-frame-pointer
|
2005-04-17 00:20:36 +02:00
|
|
|
endif
|
2010-08-10 20:20:53 +02:00
|
|
|
endif
|
2005-04-17 00:20:36 +02:00
|
|
|
|
Fix gcc-4.9.0 miscompilation of load_balance() in scheduler
Michel Dänzer and a couple of other people reported inexplicable random
oopses in the scheduler, and the cause turns out to be gcc mis-compiling
the load_balance() function when debugging is enabled. The gcc bug
apparently goes back to gcc-4.5, but slight optimization changes means
that it now showed up as a problem in 4.9.0 and 4.9.1.
The instruction scheduling problem causes gcc to schedule a spill
operation to before the stack frame has been created, which in turn can
corrupt the spilled value if an interrupt comes in. There may be other
effects of this bug too, but that's the code generation problem seen in
Michel's case.
This is fixed in current gcc HEAD, but the workaround as suggested by
Markus Trippelsdorf is pretty simple: use -fno-var-tracking-assignments
when compiling the kernel, which disables the gcc code that causes the
problem. This can result in slightly worse debug information for
variable accesses, but that is infinitely preferable to actual code
generation problems.
Doing this unconditionally (not just for CONFIG_DEBUG_INFO) also allows
non-debug builds to verify that the debug build would be identical: we
can do
export GCC_COMPARE_DEBUG=1
to make gcc internally verify that the result of the build is
independent of the "-g" flag (it will make the compiler build everything
twice, toggling the debug flag, and compare the results).
Without the "-fno-var-tracking-assignments" option, the build would fail
(even with 4.8.3 that didn't show the actual stack frame bug) with a gcc
compare failure.
See also gcc bugzilla:
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=61801
Reported-by: Michel Dänzer <michel@daenzer.net>
Suggested-by: Markus Trippelsdorf <markus@trippelsdorf.de>
Cc: Jakub Jelinek <jakub@redhat.com>
Cc: stable@kernel.org
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2014-07-26 23:52:01 +02:00
|
|
|
KBUILD_CFLAGS += $(call cc-option, -fno-var-tracking-assignments)
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
ifdef CONFIG_DEBUG_INFO
|
2014-07-30 20:50:18 +02:00
|
|
|
ifdef CONFIG_DEBUG_INFO_SPLIT
|
|
|
|
KBUILD_CFLAGS += $(call cc-option, -gsplit-dwarf, -g)
|
|
|
|
else
|
2007-10-14 22:21:35 +02:00
|
|
|
KBUILD_CFLAGS += -g
|
2014-07-30 20:50:18 +02:00
|
|
|
endif
|
2014-02-15 00:19:17 +01:00
|
|
|
KBUILD_AFLAGS += -Wa,-gdwarf-2
|
2005-04-17 00:20:36 +02:00
|
|
|
endif
|
2014-07-30 20:50:19 +02:00
|
|
|
ifdef CONFIG_DEBUG_INFO_DWARF4
|
|
|
|
KBUILD_CFLAGS += $(call cc-option, -gdwarf-4,)
|
|
|
|
endif
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2010-07-14 15:43:52 +02:00
|
|
|
ifdef CONFIG_DEBUG_INFO_REDUCED
|
2013-02-07 22:58:40 +01:00
|
|
|
KBUILD_CFLAGS += $(call cc-option, -femit-struct-debug-baseonly) \
|
|
|
|
$(call cc-option,-fno-var-tracking)
|
2010-07-14 15:43:52 +02:00
|
|
|
endif
|
|
|
|
|
2008-10-07 01:06:12 +02:00
|
|
|
ifdef CONFIG_FUNCTION_TRACER
|
2015-01-09 13:06:33 +01:00
|
|
|
ifndef CC_FLAGS_FTRACE
|
|
|
|
CC_FLAGS_FTRACE := -pg
|
|
|
|
endif
|
|
|
|
export CC_FLAGS_FTRACE
|
2011-02-09 19:15:59 +01:00
|
|
|
ifdef CONFIG_HAVE_FENTRY
|
|
|
|
CC_USING_FENTRY := $(call cc-option, -mfentry -DCC_USING_FENTRY)
|
|
|
|
endif
|
2015-01-09 13:06:33 +01:00
|
|
|
KBUILD_CFLAGS += $(CC_FLAGS_FTRACE) $(CC_USING_FENTRY)
|
2011-02-09 19:15:59 +01:00
|
|
|
KBUILD_AFLAGS += $(CC_USING_FENTRY)
|
2010-10-13 23:12:30 +02:00
|
|
|
ifdef CONFIG_DYNAMIC_FTRACE
|
2010-10-15 05:32:44 +02:00
|
|
|
ifdef CONFIG_HAVE_C_RECORDMCOUNT
|
2010-10-13 23:12:30 +02:00
|
|
|
BUILD_C_RECORDMCOUNT := y
|
|
|
|
export BUILD_C_RECORDMCOUNT
|
|
|
|
endif
|
|
|
|
endif
|
2008-05-12 21:20:42 +02:00
|
|
|
endif
|
|
|
|
|
2008-01-21 21:31:44 +01:00
|
|
|
# We trigger additional mismatches with less inlining
|
|
|
|
ifdef CONFIG_DEBUG_SECTION_MISMATCH
|
|
|
|
KBUILD_CFLAGS += $(call cc-option, -fno-inline-functions-called-once)
|
|
|
|
endif
|
|
|
|
|
2005-05-01 01:51:42 +02:00
|
|
|
# arch Makefile may override CC so keep this after arch Makefile is included
|
2005-05-17 06:53:46 +02:00
|
|
|
NOSTDINC_FLAGS += -nostdinc -isystem $(shell $(CC) -print-file-name=include)
|
2005-05-01 01:51:42 +02:00
|
|
|
CHECKFLAGS += $(NOSTDINC_FLAGS)
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
# warn about C99 declaration after statement
|
2007-10-14 22:21:35 +02:00
|
|
|
KBUILD_CFLAGS += $(call cc-option,-Wdeclaration-after-statement,)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2006-06-25 00:07:55 +02:00
|
|
|
# disable pointer signed / unsigned warnings in gcc 4.0
|
2011-05-02 12:51:15 +02:00
|
|
|
KBUILD_CFLAGS += $(call cc-disable-warning, pointer-sign)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2009-04-09 13:34:34 +02:00
|
|
|
# disable invalid "can't wrap" optimizations for signed / pointers
|
2009-07-12 20:25:04 +02:00
|
|
|
KBUILD_CFLAGS += $(call cc-option,-fno-strict-overflow)
|
2009-03-19 23:53:19 +01:00
|
|
|
|
2009-09-18 21:49:37 +02:00
|
|
|
# conserve stack if available
|
|
|
|
KBUILD_CFLAGS += $(call cc-option,-fconserve-stack)
|
|
|
|
|
2013-09-13 23:51:40 +02:00
|
|
|
# disallow errors like 'EXPORT_GPL(foo);' with missing header
|
|
|
|
KBUILD_CFLAGS += $(call cc-option,-Werror=implicit-int)
|
|
|
|
|
|
|
|
# require functions to have arguments in prototypes, not empty 'int foo()'
|
|
|
|
KBUILD_CFLAGS += $(call cc-option,-Werror=strict-prototypes)
|
|
|
|
|
2013-12-23 22:56:06 +01:00
|
|
|
# Prohibit date/time macros, which would make the build non-deterministic
|
|
|
|
KBUILD_CFLAGS += $(call cc-option,-Werror=date-time)
|
|
|
|
|
2011-04-20 13:45:30 +02:00
|
|
|
# use the deterministic mode of AR if available
|
|
|
|
KBUILD_ARFLAGS := $(call ar-option,D)
|
|
|
|
|
2010-09-17 17:09:00 +02:00
|
|
|
# check for 'asm goto'
|
|
|
|
ifeq ($(shell $(CONFIG_SHELL) $(srctree)/scripts/gcc-goto.sh $(CC)), y)
|
|
|
|
KBUILD_CFLAGS += -DCC_HAVE_ASM_GOTO
|
|
|
|
endif
|
|
|
|
|
kasan: add kernel address sanitizer infrastructure
Kernel Address sanitizer (KASan) is a dynamic memory error detector. It
provides fast and comprehensive solution for finding use-after-free and
out-of-bounds bugs.
KASAN uses compile-time instrumentation for checking every memory access,
therefore GCC > v4.9.2 required. v4.9.2 almost works, but has issues with
putting symbol aliases into the wrong section, which breaks kasan
instrumentation of globals.
This patch only adds infrastructure for kernel address sanitizer. It's
not available for use yet. The idea and some code was borrowed from [1].
Basic idea:
The main idea of KASAN is to use shadow memory to record whether each byte
of memory is safe to access or not, and use compiler's instrumentation to
check the shadow memory on each memory access.
Address sanitizer uses 1/8 of the memory addressable in kernel for shadow
memory and uses direct mapping with a scale and offset to translate a
memory address to its corresponding shadow address.
Here is function to translate address to corresponding shadow address:
unsigned long kasan_mem_to_shadow(unsigned long addr)
{
return (addr >> KASAN_SHADOW_SCALE_SHIFT) + KASAN_SHADOW_OFFSET;
}
where KASAN_SHADOW_SCALE_SHIFT = 3.
So for every 8 bytes there is one corresponding byte of shadow memory.
The following encoding used for each shadow byte: 0 means that all 8 bytes
of the corresponding memory region are valid for access; k (1 <= k <= 7)
means that the first k bytes are valid for access, and other (8 - k) bytes
are not; Any negative value indicates that the entire 8-bytes are
inaccessible. Different negative values used to distinguish between
different kinds of inaccessible memory (redzones, freed memory) (see
mm/kasan/kasan.h).
To be able to detect accesses to bad memory we need a special compiler.
Such compiler inserts a specific function calls (__asan_load*(addr),
__asan_store*(addr)) before each memory access of size 1, 2, 4, 8 or 16.
These functions check whether memory region is valid to access or not by
checking corresponding shadow memory. If access is not valid an error
printed.
Historical background of the address sanitizer from Dmitry Vyukov:
"We've developed the set of tools, AddressSanitizer (Asan),
ThreadSanitizer and MemorySanitizer, for user space. We actively use
them for testing inside of Google (continuous testing, fuzzing,
running prod services). To date the tools have found more than 10'000
scary bugs in Chromium, Google internal codebase and various
open-source projects (Firefox, OpenSSL, gcc, clang, ffmpeg, MySQL and
lots of others): [2] [3] [4].
The tools are part of both gcc and clang compilers.
We have not yet done massive testing under the Kernel AddressSanitizer
(it's kind of chicken and egg problem, you need it to be upstream to
start applying it extensively). To date it has found about 50 bugs.
Bugs that we've found in upstream kernel are listed in [5].
We've also found ~20 bugs in out internal version of the kernel. Also
people from Samsung and Oracle have found some.
[...]
As others noted, the main feature of AddressSanitizer is its
performance due to inline compiler instrumentation and simple linear
shadow memory. User-space Asan has ~2x slowdown on computational
programs and ~2x memory consumption increase. Taking into account that
kernel usually consumes only small fraction of CPU and memory when
running real user-space programs, I would expect that kernel Asan will
have ~10-30% slowdown and similar memory consumption increase (when we
finish all tuning).
I agree that Asan can well replace kmemcheck. We have plans to start
working on Kernel MemorySanitizer that finds uses of unitialized
memory. Asan+Msan will provide feature-parity with kmemcheck. As
others noted, Asan will unlikely replace debug slab and pagealloc that
can be enabled at runtime. Asan uses compiler instrumentation, so even
if it is disabled, it still incurs visible overheads.
Asan technology is easily portable to other architectures. Compiler
instrumentation is fully portable. Runtime has some arch-dependent
parts like shadow mapping and atomic operation interception. They are
relatively easy to port."
Comparison with other debugging features:
========================================
KMEMCHECK:
- KASan can do almost everything that kmemcheck can. KASan uses
compile-time instrumentation, which makes it significantly faster than
kmemcheck. The only advantage of kmemcheck over KASan is detection of
uninitialized memory reads.
Some brief performance testing showed that kasan could be
x500-x600 times faster than kmemcheck:
$ netperf -l 30
MIGRATED TCP STREAM TEST from 0.0.0.0 (0.0.0.0) port 0 AF_INET to localhost (127.0.0.1) port 0 AF_INET
Recv Send Send
Socket Socket Message Elapsed
Size Size Size Time Throughput
bytes bytes bytes secs. 10^6bits/sec
no debug: 87380 16384 16384 30.00 41624.72
kasan inline: 87380 16384 16384 30.00 12870.54
kasan outline: 87380 16384 16384 30.00 10586.39
kmemcheck: 87380 16384 16384 30.03 20.23
- Also kmemcheck couldn't work on several CPUs. It always sets
number of CPUs to 1. KASan doesn't have such limitation.
DEBUG_PAGEALLOC:
- KASan is slower than DEBUG_PAGEALLOC, but KASan works on sub-page
granularity level, so it able to find more bugs.
SLUB_DEBUG (poisoning, redzones):
- SLUB_DEBUG has lower overhead than KASan.
- SLUB_DEBUG in most cases are not able to detect bad reads,
KASan able to detect both reads and writes.
- In some cases (e.g. redzone overwritten) SLUB_DEBUG detect
bugs only on allocation/freeing of object. KASan catch
bugs right before it will happen, so we always know exact
place of first bad read/write.
[1] https://code.google.com/p/address-sanitizer/wiki/AddressSanitizerForKernel
[2] https://code.google.com/p/address-sanitizer/wiki/FoundBugs
[3] https://code.google.com/p/thread-sanitizer/wiki/FoundBugs
[4] https://code.google.com/p/memory-sanitizer/wiki/FoundBugs
[5] https://code.google.com/p/address-sanitizer/wiki/AddressSanitizerForKernel#Trophies
Based on work by Andrey Konovalov.
Signed-off-by: Andrey Ryabinin <a.ryabinin@samsung.com>
Acked-by: Michal Marek <mmarek@suse.cz>
Signed-off-by: Andrey Konovalov <adech.fo@gmail.com>
Cc: Dmitry Vyukov <dvyukov@google.com>
Cc: Konstantin Serebryany <kcc@google.com>
Cc: Dmitry Chernenkov <dmitryc@google.com>
Cc: Yuri Gribov <tetra2005@gmail.com>
Cc: Konstantin Khlebnikov <koct9i@gmail.com>
Cc: Sasha Levin <sasha.levin@oracle.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Joonsoo Kim <iamjoonsoo.kim@lge.com>
Cc: Dave Hansen <dave.hansen@intel.com>
Cc: Andi Kleen <andi@firstfloor.org>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Christoph Lameter <cl@linux.com>
Cc: Pekka Enberg <penberg@kernel.org>
Cc: David Rientjes <rientjes@google.com>
Cc: Stephen Rothwell <sfr@canb.auug.org.au>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2015-02-13 23:39:17 +01:00
|
|
|
include $(srctree)/scripts/Makefile.kasan
|
2014-04-14 11:27:10 +02:00
|
|
|
include $(srctree)/scripts/Makefile.extrawarn
|
|
|
|
|
2007-10-15 22:17:25 +02:00
|
|
|
# Add user supplied CPPFLAGS, AFLAGS and CFLAGS as the last assignments
|
2012-08-14 18:00:54 +02:00
|
|
|
KBUILD_CPPFLAGS += $(KCPPFLAGS)
|
|
|
|
KBUILD_AFLAGS += $(KAFLAGS)
|
|
|
|
KBUILD_CFLAGS += $(KCFLAGS)
|
2007-10-15 22:03:58 +02:00
|
|
|
|
2007-07-19 10:48:40 +02:00
|
|
|
# Use --build-id when available.
|
|
|
|
LDFLAGS_BUILD_ID = $(patsubst -Wl$(comma)%,%,\
|
2009-09-19 10:14:33 +02:00
|
|
|
$(call cc-ldoption, -Wl$(comma)--build-id,))
|
kbuild: allow assignment to {A,C,LD}FLAGS_MODULE on the command line
It is now possible to assign options to AS, CC and LD
on the command line - which is only used when building modules.
{A,C,LD}FLAGS_MODULE was all used both in the top-level Makefile
in the arch makefiles, thus users had no way to specify
additional options to AS, CC, LD when building modules
without overriding the original value.
Introduce a new set of variables KBUILD_{A,C,LD}FLAGS_MODULE
that is used by arch specific files and free up
{A,C,LD}FLAGS_MODULE so they can be assigned on
the command line.
All arch Makefiles that used the old variables has been updated.
Note: Previously we had a MODFLAGS variable for both
AS and CC. But in favour of consistency this was dropped.
So in some cases arch Makefile has one assignmnet replaced by
two assignmnets.
Note2: MODFLAGS was not documented and is dropped
without any notice. I do not expect much/any breakage
from this.
Signed-off-by: Sam Ravnborg <sam@ravnborg.org>
Cc: Denys Vlasenko <vda.linux@googlemail.com>
Cc: Haavard Skinnemoen <hskinnemoen@atmel.com>
Cc: Mike Frysinger <vapier@gentoo.org>
Cc: Tony Luck <tony.luck@intel.com>
Cc: Geert Uytterhoeven <geert@linux-m68k.org>
Cc: Ralf Baechle <ralf@linux-mips.org>
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Cc: Martin Schwidefsky <schwidefsky@de.ibm.com>
Cc: Chen Liqin <liqin.chen@sunplusct.com>
Acked-by: Mike Frysinger <vapier@gentoo.org> [blackfin]
Acked-by: Haavard Skinnemoen <haavard.skinnemoen@atmel.com> [avr32]
Signed-off-by: Michal Marek <mmarek@suse.cz>
2010-07-28 17:33:09 +02:00
|
|
|
KBUILD_LDFLAGS_MODULE += $(LDFLAGS_BUILD_ID)
|
2007-07-19 10:48:40 +02:00
|
|
|
LDFLAGS_vmlinux += $(LDFLAGS_BUILD_ID)
|
|
|
|
|
2009-03-04 20:59:07 +01:00
|
|
|
ifeq ($(CONFIG_STRIP_ASM_SYMS),y)
|
2009-09-16 22:36:55 +02:00
|
|
|
LDFLAGS_vmlinux += $(call ld-option, -X,)
|
2009-03-04 20:59:07 +01:00
|
|
|
endif
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
# Default kernel image to build when no specific target is given.
|
2006-06-25 00:07:55 +02:00
|
|
|
# KBUILD_IMAGE may be overruled on the command line or
|
2005-04-17 00:20:36 +02:00
|
|
|
# set in the environment
|
|
|
|
# Also any assignments in arch/$(ARCH)/Makefile take precedence over
|
|
|
|
# this default value
|
|
|
|
export KBUILD_IMAGE ?= vmlinux
|
|
|
|
|
|
|
|
#
|
|
|
|
# INSTALL_PATH specifies where to place the updated kernel and system map
|
|
|
|
# images. Default is /boot, but you can set it to other values
|
|
|
|
export INSTALL_PATH ?= /boot
|
|
|
|
|
2013-12-02 00:56:28 +01:00
|
|
|
#
|
|
|
|
# INSTALL_DTBS_PATH specifies a prefix for relocations required by build roots.
|
|
|
|
# Like INSTALL_MOD_PATH, it isn't defined in the Makefile, but can be passed as
|
|
|
|
# an argument if needed. Otherwise it defaults to the kernel install path
|
|
|
|
#
|
|
|
|
export INSTALL_DTBS_PATH ?= $(INSTALL_PATH)/dtbs/$(KERNELRELEASE)
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
#
|
|
|
|
# INSTALL_MOD_PATH specifies a prefix to MODLIB for module directory
|
|
|
|
# relocations required by build roots. This is not defined in the
|
2006-06-25 00:07:55 +02:00
|
|
|
# makefile but the argument can be passed to make if needed.
|
2005-04-17 00:20:36 +02:00
|
|
|
#
|
|
|
|
|
2006-01-16 12:46:07 +01:00
|
|
|
MODLIB = $(INSTALL_MOD_PATH)/lib/modules/$(KERNELRELEASE)
|
2005-04-17 00:20:36 +02:00
|
|
|
export MODLIB
|
|
|
|
|
2006-06-22 02:53:09 +02:00
|
|
|
#
|
2014-04-28 09:32:43 +02:00
|
|
|
# INSTALL_MOD_STRIP, if defined, will cause modules to be
|
|
|
|
# stripped after they are installed. If INSTALL_MOD_STRIP is '1', then
|
|
|
|
# the default option --strip-debug will be used. Otherwise,
|
|
|
|
# INSTALL_MOD_STRIP value will be used as the options to the strip command.
|
2009-01-14 21:38:20 +01:00
|
|
|
|
2006-06-22 02:53:09 +02:00
|
|
|
ifdef INSTALL_MOD_STRIP
|
|
|
|
ifeq ($(INSTALL_MOD_STRIP),1)
|
2009-01-14 21:38:20 +01:00
|
|
|
mod_strip_cmd = $(STRIP) --strip-debug
|
2006-06-22 02:53:09 +02:00
|
|
|
else
|
2009-01-14 21:38:20 +01:00
|
|
|
mod_strip_cmd = $(STRIP) $(INSTALL_MOD_STRIP)
|
2006-06-22 02:53:09 +02:00
|
|
|
endif # INSTALL_MOD_STRIP=1
|
|
|
|
else
|
2009-01-14 21:38:20 +01:00
|
|
|
mod_strip_cmd = true
|
2006-06-22 02:53:09 +02:00
|
|
|
endif # INSTALL_MOD_STRIP
|
|
|
|
export mod_strip_cmd
|
|
|
|
|
2014-08-27 13:01:56 +02:00
|
|
|
# CONFIG_MODULE_COMPRESS, if defined, will cause module to be compressed
|
|
|
|
# after they are installed in agreement with CONFIG_MODULE_COMPRESS_GZIP
|
|
|
|
# or CONFIG_MODULE_COMPRESS_XZ.
|
|
|
|
|
|
|
|
mod_compress_cmd = true
|
|
|
|
ifdef CONFIG_MODULE_COMPRESS
|
|
|
|
ifdef CONFIG_MODULE_COMPRESS_GZIP
|
|
|
|
mod_compress_cmd = gzip -n
|
|
|
|
endif # CONFIG_MODULE_COMPRESS_GZIP
|
|
|
|
ifdef CONFIG_MODULE_COMPRESS_XZ
|
|
|
|
mod_compress_cmd = xz
|
|
|
|
endif # CONFIG_MODULE_COMPRESS_XZ
|
|
|
|
endif # CONFIG_MODULE_COMPRESS
|
|
|
|
export mod_compress_cmd
|
|
|
|
|
2013-11-13 00:11:44 +01:00
|
|
|
# Select initial ramdisk compression format, default is gzip(1).
|
|
|
|
# This shall be used by the dracut(8) tool while creating an initramfs image.
|
|
|
|
#
|
2013-12-19 02:08:57 +01:00
|
|
|
INITRD_COMPRESS-y := gzip
|
|
|
|
INITRD_COMPRESS-$(CONFIG_RD_BZIP2) := bzip2
|
|
|
|
INITRD_COMPRESS-$(CONFIG_RD_LZMA) := lzma
|
|
|
|
INITRD_COMPRESS-$(CONFIG_RD_XZ) := xz
|
|
|
|
INITRD_COMPRESS-$(CONFIG_RD_LZO) := lzo
|
|
|
|
INITRD_COMPRESS-$(CONFIG_RD_LZ4) := lz4
|
2013-12-21 01:52:45 +01:00
|
|
|
# do not export INITRD_COMPRESS, since we didn't actually
|
|
|
|
# choose a sane default compression above.
|
|
|
|
# export INITRD_COMPRESS := $(INITRD_COMPRESS-y)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2013-01-25 04:11:31 +01:00
|
|
|
ifdef CONFIG_MODULE_SIG_ALL
|
2012-10-19 03:23:15 +02:00
|
|
|
MODSECKEY = ./signing_key.priv
|
|
|
|
MODPUBKEY = ./signing_key.x509
|
|
|
|
export MODPUBKEY
|
2013-01-25 04:11:12 +01:00
|
|
|
mod_sign_cmd = perl $(srctree)/scripts/sign-file $(CONFIG_MODULE_SIG_HASH) $(MODSECKEY) $(MODPUBKEY)
|
2012-10-19 03:23:15 +02:00
|
|
|
else
|
|
|
|
mod_sign_cmd = true
|
|
|
|
endif
|
|
|
|
export mod_sign_cmd
|
|
|
|
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
ifeq ($(KBUILD_EXTMOD),)
|
2005-11-04 08:43:35 +01:00
|
|
|
core-y += kernel/ mm/ fs/ ipc/ security/ crypto/ block/
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
vmlinux-dirs := $(patsubst %/,%,$(filter %/, $(init-y) $(init-m) \
|
|
|
|
$(core-y) $(core-m) $(drivers-y) $(drivers-m) \
|
|
|
|
$(net-y) $(net-m) $(libs-y) $(libs-m)))
|
|
|
|
|
|
|
|
vmlinux-alldirs := $(sort $(vmlinux-dirs) $(patsubst %/,%,$(filter %/, \
|
2014-10-02 15:27:07 +02:00
|
|
|
$(init-) $(core-) $(drivers-) $(net-) $(libs-))))
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
init-y := $(patsubst %/, %/built-in.o, $(init-y))
|
|
|
|
core-y := $(patsubst %/, %/built-in.o, $(core-y))
|
|
|
|
drivers-y := $(patsubst %/, %/built-in.o, $(drivers-y))
|
|
|
|
net-y := $(patsubst %/, %/built-in.o, $(net-y))
|
|
|
|
libs-y1 := $(patsubst %/, %/lib.a, $(libs-y))
|
|
|
|
libs-y2 := $(patsubst %/, %/built-in.o, $(libs-y))
|
|
|
|
libs-y := $(libs-y1) $(libs-y2)
|
|
|
|
|
2012-05-05 10:18:41 +02:00
|
|
|
# Externally visible symbols (used by link-vmlinux.sh)
|
2012-05-05 10:18:40 +02:00
|
|
|
export KBUILD_VMLINUX_INIT := $(head-y) $(init-y)
|
|
|
|
export KBUILD_VMLINUX_MAIN := $(core-y) $(libs-y) $(drivers-y) $(net-y)
|
|
|
|
export KBUILD_LDS := arch/$(SRCARCH)/kernel/vmlinux.lds
|
2012-05-05 10:18:41 +02:00
|
|
|
export LDFLAGS_vmlinux
|
2013-04-12 14:12:50 +02:00
|
|
|
# used by scripts/pacmage/Makefile
|
|
|
|
export KBUILD_ALLDIRS := $(sort $(filter-out arch/%,$(vmlinux-alldirs)) arch Documentation include samples scripts tools virt)
|
2008-12-16 12:30:08 +01:00
|
|
|
|
2012-05-05 10:18:41 +02:00
|
|
|
vmlinux-deps := $(KBUILD_LDS) $(KBUILD_VMLINUX_INIT) $(KBUILD_VMLINUX_MAIN)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2012-05-05 10:18:41 +02:00
|
|
|
# Final link of vmlinux
|
|
|
|
cmd_link-vmlinux = $(CONFIG_SHELL) $< $(LD) $(LDFLAGS) $(LDFLAGS_vmlinux)
|
|
|
|
quiet_cmd_link-vmlinux = LINK $@
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2012-05-05 10:18:41 +02:00
|
|
|
# Include targets which we want to
|
|
|
|
# execute if the rest of the kernel build went well.
|
|
|
|
vmlinux: scripts/link-vmlinux.sh $(vmlinux-deps) FORCE
|
2006-10-11 10:21:43 +02:00
|
|
|
ifdef CONFIG_HEADERS_CHECK
|
2006-10-13 17:04:23 +02:00
|
|
|
$(Q)$(MAKE) -f $(srctree)/Makefile headers_check
|
2007-10-19 08:41:07 +02:00
|
|
|
endif
|
|
|
|
ifdef CONFIG_SAMPLES
|
|
|
|
$(Q)$(MAKE) $(build)=samples
|
docsrc: build Documentation/ sources
Currently source files in the Documentation/ sub-dir can easily bit-rot
since they are not generally buildable, either because they are hidden in
text files or because there are no Makefile rules for them. This needs to
be fixed so that the source files remain usable and good examples of code
instead of bad examples.
Add the ability to build source files that are in the Documentation/ dir.
Add to Kconfig as "BUILD_DOCSRC" config symbol.
Use "CONFIG_BUILD_DOCSRC=1 make ..." to build objects from the
Documentation/ sources. Or enable BUILD_DOCSRC in the *config system.
However, this symbol depends on HEADERS_CHECK since the header files need
to be installed (for userspace builds).
Built (using cross-tools) for x86-64, i386, alpha, ia64, sparc32,
sparc64, powerpc, sh, m68k, & mips.
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Reviewed-by: Sam Ravnborg <sam@ravnborg.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2008-08-13 00:09:06 +02:00
|
|
|
endif
|
|
|
|
ifdef CONFIG_BUILD_DOCSRC
|
|
|
|
$(Q)$(MAKE) $(build)=Documentation
|
2015-02-17 22:46:36 +01:00
|
|
|
endif
|
|
|
|
ifdef CONFIG_GDB_SCRIPTS
|
|
|
|
$(Q)ln -fsn `cd $(srctree) && /bin/pwd`/scripts/gdb/vmlinux-gdb.py
|
2006-10-11 10:21:43 +02:00
|
|
|
endif
|
2012-05-05 10:18:41 +02:00
|
|
|
+$(call if_changed,link-vmlinux)
|
2007-07-17 10:54:06 +02:00
|
|
|
|
2014-04-28 09:26:18 +02:00
|
|
|
# The actual objects are generated when descending,
|
2005-04-17 00:20:36 +02:00
|
|
|
# make sure no implicit rule kicks in
|
2012-05-05 10:18:41 +02:00
|
|
|
$(sort $(vmlinux-deps)): $(vmlinux-dirs) ;
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# Handle descending into subdirectories listed in $(vmlinux-dirs)
|
|
|
|
# Preset locale variables to speed up the build process. Limit locale
|
|
|
|
# tweaks to this spot to avoid wrong language settings when running
|
|
|
|
# make menuconfig etc.
|
|
|
|
# Error messages still appears in the original language
|
|
|
|
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += $(vmlinux-dirs)
|
2005-09-11 22:30:22 +02:00
|
|
|
$(vmlinux-dirs): prepare scripts
|
2005-04-17 00:20:36 +02:00
|
|
|
$(Q)$(MAKE) $(build)=$@
|
|
|
|
|
2013-07-11 15:34:51 +02:00
|
|
|
define filechk_kernel.release
|
|
|
|
echo "$(KERNELVERSION)$$($(CONFIG_SHELL) $(srctree)/scripts/setlocalversion $(srctree))"
|
|
|
|
endef
|
|
|
|
|
2013-06-28 11:27:31 +02:00
|
|
|
# Store (new) KERNELRELEASE string in include/config/kernel.release
|
2006-06-09 07:12:43 +02:00
|
|
|
include/config/kernel.release: include/config/auto.conf FORCE
|
2013-07-11 15:34:51 +02:00
|
|
|
$(call filechk,kernel.release)
|
2006-01-09 21:20:34 +01:00
|
|
|
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
# Things we need to do before we recursively start building the kernel
|
2005-09-11 22:30:22 +02:00
|
|
|
# or the modules are listed in "prepare".
|
|
|
|
# A multi level approach is used. prepareN is processed before prepareN-1.
|
|
|
|
# archprepare is used in arch Makefiles and when processed asm symlink,
|
|
|
|
# version.h and scripts_basic is processed / created.
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2005-09-11 22:30:22 +02:00
|
|
|
# Listed in dependency order
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += prepare archprepare prepare0 prepare1 prepare2 prepare3
|
2005-09-11 22:30:22 +02:00
|
|
|
|
2005-09-09 19:28:28 +02:00
|
|
|
# prepare3 is used to check if we are building in a separate output directory,
|
2005-04-17 00:20:36 +02:00
|
|
|
# and if so do:
|
|
|
|
# 1) Check that make has not been executed in the kernel src $(srctree)
|
2006-06-09 07:12:43 +02:00
|
|
|
prepare3: include/config/kernel.release
|
2005-04-17 00:20:36 +02:00
|
|
|
ifneq ($(KBUILD_SRC),)
|
2008-11-06 09:31:35 +01:00
|
|
|
@$(kecho) ' Using $(srctree) as source for kernel'
|
2006-06-09 07:12:39 +02:00
|
|
|
$(Q)if [ -f $(srctree)/.config -o -d $(srctree)/include/config ]; then \
|
2012-07-07 23:04:40 +02:00
|
|
|
echo >&2 " $(srctree) is not clean, please run 'make mrproper'"; \
|
|
|
|
echo >&2 " in the '$(srctree)' directory.";\
|
2005-04-17 00:20:36 +02:00
|
|
|
/bin/false; \
|
|
|
|
fi;
|
|
|
|
endif
|
|
|
|
|
2005-09-09 19:28:28 +02:00
|
|
|
# prepare2 creates a makefile if using a separate output directory
|
2011-04-27 22:29:49 +02:00
|
|
|
prepare2: prepare3 outputmakefile asm-generic
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2012-10-02 19:01:56 +02:00
|
|
|
prepare1: prepare2 $(version_h) include/generated/utsrelease.h \
|
2009-10-18 00:00:43 +02:00
|
|
|
include/config/auto.conf
|
2007-10-19 22:20:02 +02:00
|
|
|
$(cmd_crmodverdir)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2012-05-08 20:22:24 +02:00
|
|
|
archprepare: archheaders archscripts prepare1 scripts_basic
|
2005-09-11 22:30:22 +02:00
|
|
|
|
|
|
|
prepare0: archprepare FORCE
|
2005-09-10 21:05:36 +02:00
|
|
|
$(Q)$(MAKE) $(build)=.
|
2005-09-09 19:28:28 +02:00
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
# All the preparing..
|
2007-02-14 09:33:01 +01:00
|
|
|
prepare: prepare0
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# Generate some files
|
|
|
|
# ---------------------------------------------------------------------------
|
|
|
|
|
|
|
|
# KERNELRELEASE can change from a few different places, meaning version.h
|
|
|
|
# needs to be updated, so this check is forced on all builds
|
|
|
|
|
|
|
|
uts_len := 64
|
2006-07-03 23:30:54 +02:00
|
|
|
define filechk_utsrelease.h
|
|
|
|
if [ `echo -n "$(KERNELRELEASE)" | wc -c ` -gt $(uts_len) ]; then \
|
|
|
|
echo '"$(KERNELRELEASE)" exceeds $(uts_len) characters' >&2; \
|
|
|
|
exit 1; \
|
|
|
|
fi; \
|
|
|
|
(echo \#define UTS_RELEASE \"$(KERNELRELEASE)\";)
|
|
|
|
endef
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
define filechk_version.h
|
2012-02-16 22:49:15 +01:00
|
|
|
(echo \#define LINUX_VERSION_CODE $(shell \
|
|
|
|
expr $(VERSION) \* 65536 + 0$(PATCHLEVEL) \* 256 + 0$(SUBLEVEL)); \
|
2006-07-03 23:30:54 +02:00
|
|
|
echo '#define KERNEL_VERSION(a,b,c) (((a) << 16) + ((b) << 8) + (c))';)
|
2005-04-17 00:20:36 +02:00
|
|
|
endef
|
|
|
|
|
2012-10-02 19:01:56 +02:00
|
|
|
$(version_h): $(srctree)/Makefile FORCE
|
2005-04-17 00:20:36 +02:00
|
|
|
$(call filechk,version.h)
|
2014-11-27 16:13:17 +01:00
|
|
|
$(Q)rm -f $(old_version_h)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2009-10-18 00:52:28 +02:00
|
|
|
include/generated/utsrelease.h: include/config/kernel.release FORCE
|
2006-07-03 23:30:54 +02:00
|
|
|
$(call filechk,utsrelease.h)
|
|
|
|
|
2008-12-16 12:33:43 +01:00
|
|
|
PHONY += headerdep
|
|
|
|
headerdep:
|
2011-04-26 23:17:11 +02:00
|
|
|
$(Q)find $(srctree)/include/ -name '*.h' | xargs --max-args 1 \
|
|
|
|
$(srctree)/scripts/headerdep.pl -I$(srctree)/include
|
2008-12-16 12:33:43 +01:00
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
# ---------------------------------------------------------------------------
|
|
|
|
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += depend dep
|
2005-04-17 00:20:36 +02:00
|
|
|
depend dep:
|
|
|
|
@echo '*** Warning: make $@ is unnecessary now.'
|
|
|
|
|
2008-05-29 10:01:51 +02:00
|
|
|
# ---------------------------------------------------------------------------
|
|
|
|
# Firmware install
|
|
|
|
INSTALL_FW_PATH=$(INSTALL_MOD_PATH)/lib/firmware
|
|
|
|
export INSTALL_FW_PATH
|
|
|
|
|
|
|
|
PHONY += firmware_install
|
|
|
|
firmware_install: FORCE
|
|
|
|
@mkdir -p $(objtree)/firmware
|
|
|
|
$(Q)$(MAKE) -f $(srctree)/scripts/Makefile.fwinst obj=firmware __fw_install
|
|
|
|
|
2006-06-18 12:58:39 +02:00
|
|
|
# ---------------------------------------------------------------------------
|
|
|
|
# Kernel headers
|
|
|
|
|
2008-06-05 16:43:46 +02:00
|
|
|
#Default location for installed headers
|
|
|
|
export INSTALL_HDR_PATH = $(objtree)/usr
|
2006-09-24 23:16:03 +02:00
|
|
|
|
2008-06-21 00:24:17 +02:00
|
|
|
# If we do an all arch process set dst to asm-$(hdr-arch)
|
|
|
|
hdr-dst = $(if $(KBUILD_HEADERS), dst=include/asm-$(hdr-arch), dst=include/asm)
|
2008-06-05 16:43:46 +02:00
|
|
|
|
2011-11-17 22:17:35 +01:00
|
|
|
PHONY += archheaders
|
|
|
|
archheaders:
|
|
|
|
|
2012-05-08 20:22:24 +02:00
|
|
|
PHONY += archscripts
|
|
|
|
archscripts:
|
|
|
|
|
2008-06-05 16:43:46 +02:00
|
|
|
PHONY += __headers
|
2012-10-02 19:01:56 +02:00
|
|
|
__headers: $(version_h) scripts_basic asm-generic archheaders archscripts FORCE
|
2011-03-15 07:34:25 +01:00
|
|
|
$(Q)$(MAKE) $(build)=scripts build_unifdef
|
2008-06-05 16:43:46 +02:00
|
|
|
|
|
|
|
PHONY += headers_install_all
|
2008-06-21 00:24:17 +02:00
|
|
|
headers_install_all:
|
|
|
|
$(Q)$(CONFIG_SHELL) $(srctree)/scripts/headers.sh install
|
2006-09-24 23:16:03 +02:00
|
|
|
|
2006-06-18 12:58:39 +02:00
|
|
|
PHONY += headers_install
|
2008-06-05 16:43:46 +02:00
|
|
|
headers_install: __headers
|
2012-10-02 19:01:57 +02:00
|
|
|
$(if $(wildcard $(srctree)/arch/$(hdr-arch)/include/uapi/asm/Kbuild),, \
|
|
|
|
$(error Headers not exportable for the $(SRCARCH) architecture))
|
|
|
|
$(Q)$(MAKE) $(hdr-inst)=include/uapi
|
|
|
|
$(Q)$(MAKE) $(hdr-inst)=arch/$(hdr-arch)/include/uapi/asm $(hdr-dst)
|
2006-06-18 12:58:39 +02:00
|
|
|
|
2007-02-14 09:33:02 +01:00
|
|
|
PHONY += headers_check_all
|
|
|
|
headers_check_all: headers_install_all
|
2008-06-21 00:24:17 +02:00
|
|
|
$(Q)$(CONFIG_SHELL) $(srctree)/scripts/headers.sh check
|
2007-02-14 09:33:02 +01:00
|
|
|
|
2006-06-18 13:02:10 +02:00
|
|
|
PHONY += headers_check
|
|
|
|
headers_check: headers_install
|
2012-10-02 19:01:57 +02:00
|
|
|
$(Q)$(MAKE) $(hdr-inst)=include/uapi HDRCHECK=1
|
|
|
|
$(Q)$(MAKE) $(hdr-inst)=arch/$(hdr-arch)/include/uapi/asm $(hdr-dst) HDRCHECK=1
|
2006-06-18 13:02:10 +02:00
|
|
|
|
2014-08-07 21:07:46 +02:00
|
|
|
# ---------------------------------------------------------------------------
|
|
|
|
# Kernel selftest
|
|
|
|
|
|
|
|
PHONY += kselftest
|
|
|
|
kselftest:
|
|
|
|
$(Q)$(MAKE) -C tools/testing/selftests run_tests
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
# ---------------------------------------------------------------------------
|
|
|
|
# Modules
|
|
|
|
|
|
|
|
ifdef CONFIG_MODULES
|
|
|
|
|
2006-06-25 00:07:55 +02:00
|
|
|
# By default, build modules as well
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2010-03-10 12:28:58 +01:00
|
|
|
all: modules
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2014-04-28 09:32:43 +02:00
|
|
|
# Build modules
|
2007-12-07 13:04:30 +01:00
|
|
|
#
|
2014-04-28 09:32:43 +02:00
|
|
|
# A module can be listed more than once in obj-m resulting in
|
|
|
|
# duplicate lines in modules.order files. Those are removed
|
|
|
|
# using awk while concatenating to the final file.
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += modules
|
2010-06-07 22:22:12 +02:00
|
|
|
modules: $(vmlinux-dirs) $(if $(KBUILD_BUILTIN),vmlinux) modules.builtin
|
2007-12-07 13:04:30 +01:00
|
|
|
$(Q)$(AWK) '!x[$$0]++' $(vmlinux-dirs:%=$(objtree)/%/modules.order) > $(objtree)/modules.order
|
2008-11-06 09:31:35 +01:00
|
|
|
@$(kecho) ' Building modules, stage 2.';
|
2006-08-08 21:36:08 +02:00
|
|
|
$(Q)$(MAKE) -f $(srctree)/scripts/Makefile.modpost
|
2008-07-25 20:17:19 +02:00
|
|
|
$(Q)$(MAKE) -f $(srctree)/scripts/Makefile.fwinst obj=firmware __fw_modbuild
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2010-03-08 10:07:12 +01:00
|
|
|
modules.builtin: $(vmlinux-dirs:%=%/modules.builtin)
|
|
|
|
$(Q)$(AWK) '!x[$$0]++' $^ > $(objtree)/modules.builtin
|
|
|
|
|
2010-03-10 12:28:58 +01:00
|
|
|
%/modules.builtin: include/config/auto.conf
|
2010-03-08 10:07:12 +01:00
|
|
|
$(Q)$(MAKE) $(modbuiltin)=$*
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# Target to prepare building external modules
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += modules_prepare
|
2005-09-11 22:30:22 +02:00
|
|
|
modules_prepare: prepare scripts
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# Target to install modules
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += modules_install
|
2005-04-17 00:20:36 +02:00
|
|
|
modules_install: _modinst_ _modinst_post
|
|
|
|
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += _modinst_
|
2010-06-07 22:22:12 +02:00
|
|
|
_modinst_:
|
2005-04-17 00:20:36 +02:00
|
|
|
@rm -rf $(MODLIB)/kernel
|
|
|
|
@rm -f $(MODLIB)/source
|
|
|
|
@mkdir -p $(MODLIB)/kernel
|
2014-04-25 17:36:14 +02:00
|
|
|
@ln -s `cd $(srctree) && /bin/pwd` $(MODLIB)/source
|
2005-04-17 00:20:36 +02:00
|
|
|
@if [ ! $(objtree) -ef $(MODLIB)/build ]; then \
|
|
|
|
rm -f $(MODLIB)/build ; \
|
2014-04-25 17:29:45 +02:00
|
|
|
ln -s $(CURDIR) $(MODLIB)/build ; \
|
2005-04-17 00:20:36 +02:00
|
|
|
fi
|
2007-12-07 13:04:30 +01:00
|
|
|
@cp -f $(objtree)/modules.order $(MODLIB)/
|
2009-12-07 16:38:33 +01:00
|
|
|
@cp -f $(objtree)/modules.builtin $(MODLIB)/
|
2006-08-08 21:36:08 +02:00
|
|
|
$(Q)$(MAKE) -f $(srctree)/scripts/Makefile.modinst
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2007-10-18 21:24:21 +02:00
|
|
|
# This depmod is only for convenience to give the initial
|
2005-04-17 00:20:36 +02:00
|
|
|
# boot a modules.dep even before / is mounted read-write. However the
|
|
|
|
# boot script depmod is the master version.
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += _modinst_post
|
2013-07-11 04:02:51 +02:00
|
|
|
_modinst_post: _modinst_
|
2008-05-29 10:01:51 +02:00
|
|
|
$(Q)$(MAKE) -f $(srctree)/scripts/Makefile.fwinst obj=firmware __fw_modinst
|
2007-10-18 21:24:21 +02:00
|
|
|
$(call cmd,depmod)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2012-11-04 23:39:24 +01:00
|
|
|
ifeq ($(CONFIG_MODULE_SIG), y)
|
|
|
|
PHONY += modules_sign
|
|
|
|
modules_sign:
|
|
|
|
$(Q)$(MAKE) -f $(srctree)/scripts/Makefile.modsign
|
|
|
|
endif
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
else # CONFIG_MODULES
|
|
|
|
|
|
|
|
# Modules not configured
|
|
|
|
# ---------------------------------------------------------------------------
|
|
|
|
|
|
|
|
modules modules_install: FORCE
|
2012-07-07 23:04:40 +02:00
|
|
|
@echo >&2
|
|
|
|
@echo >&2 "The present kernel configuration has modules disabled."
|
|
|
|
@echo >&2 "Type 'make config' and enable loadable module support."
|
|
|
|
@echo >&2 "Then build a kernel with module support enabled."
|
|
|
|
@echo >&2
|
2005-04-17 00:20:36 +02:00
|
|
|
@exit 1
|
|
|
|
|
|
|
|
endif # CONFIG_MODULES
|
|
|
|
|
|
|
|
###
|
|
|
|
# Cleaning is done on three levels.
|
|
|
|
# make clean Delete most generated files
|
|
|
|
# Leave enough to build external modules
|
|
|
|
# make mrproper Delete the current configuration, and all generated files
|
|
|
|
# make distclean Remove editor backup files, patch leftover files and the like
|
|
|
|
|
|
|
|
# Directories & files removed with 'make clean'
|
|
|
|
CLEAN_DIRS += $(MODVERDIR)
|
|
|
|
|
|
|
|
# Directories & files removed with 'make mrproper'
|
2011-04-27 22:29:49 +02:00
|
|
|
MRPROPER_DIRS += include/config usr/include include/generated \
|
2014-04-28 09:32:43 +02:00
|
|
|
arch/*/include/generated .tmp_objdiff
|
2015-01-08 09:29:38 +01:00
|
|
|
MRPROPER_FILES += .config .config.old .version .old_version \
|
2012-10-02 07:05:24 +02:00
|
|
|
Module.symvers tags TAGS cscope* GPATH GTAGS GRTAGS GSYMS \
|
|
|
|
signing_key.priv signing_key.x509 x509.genkey \
|
|
|
|
extra_certificates signing_key.x509.keyid \
|
2015-02-17 22:46:36 +01:00
|
|
|
signing_key.x509.signer vmlinux-gdb.py
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# clean - Delete most, but leave enough to build external modules
|
|
|
|
#
|
|
|
|
clean: rm-dirs := $(CLEAN_DIRS)
|
|
|
|
clean: rm-files := $(CLEAN_FILES)
|
2012-02-04 10:55:59 +01:00
|
|
|
clean-dirs := $(addprefix _clean_, . $(vmlinux-alldirs) Documentation samples)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2012-10-29 12:23:02 +01:00
|
|
|
PHONY += $(clean-dirs) clean archclean vmlinuxclean
|
2005-04-17 00:20:36 +02:00
|
|
|
$(clean-dirs):
|
|
|
|
$(Q)$(MAKE) $(clean)=$(patsubst _clean_%,%,$@)
|
|
|
|
|
2012-10-29 12:23:02 +01:00
|
|
|
vmlinuxclean:
|
|
|
|
$(Q)$(CONFIG_SHELL) $(srctree)/scripts/link-vmlinux.sh clean
|
|
|
|
|
|
|
|
clean: archclean vmlinuxclean
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# mrproper - Delete all generated files, including .config
|
|
|
|
#
|
|
|
|
mrproper: rm-dirs := $(wildcard $(MRPROPER_DIRS))
|
|
|
|
mrproper: rm-files := $(wildcard $(MRPROPER_FILES))
|
|
|
|
mrproper-dirs := $(addprefix _mrproper_,Documentation/DocBook scripts)
|
|
|
|
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += $(mrproper-dirs) mrproper archmrproper
|
2005-04-17 00:20:36 +02:00
|
|
|
$(mrproper-dirs):
|
|
|
|
$(Q)$(MAKE) $(clean)=$(patsubst _mrproper_%,%,$@)
|
|
|
|
|
|
|
|
mrproper: clean archmrproper $(mrproper-dirs)
|
|
|
|
$(call cmd,rmdirs)
|
|
|
|
$(call cmd,rmfiles)
|
|
|
|
|
|
|
|
# distclean
|
|
|
|
#
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += distclean
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
distclean: mrproper
|
|
|
|
@find $(srctree) $(RCS_FIND_IGNORE) \
|
2006-06-25 00:07:55 +02:00
|
|
|
\( -name '*.orig' -o -name '*.rej' -o -name '*~' \
|
2005-04-17 00:20:36 +02:00
|
|
|
-o -name '*.bak' -o -name '#*#' -o -name '.*.orig' \
|
2014-03-28 08:36:12 +01:00
|
|
|
-o -name '.*.rej' -o -name '*%' -o -name 'core' \) \
|
2005-04-17 00:20:36 +02:00
|
|
|
-type f -print | xargs rm -f
|
|
|
|
|
|
|
|
|
|
|
|
# Packaging of the kernel to various formats
|
|
|
|
# ---------------------------------------------------------------------------
|
|
|
|
# rpm target kept for backward compatibility
|
2014-07-04 22:53:52 +02:00
|
|
|
package-dir := scripts/package
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2010-06-07 12:44:25 +02:00
|
|
|
%src-pkg: FORCE
|
|
|
|
$(Q)$(MAKE) $(build)=$(package-dir) $@
|
2006-06-09 07:12:37 +02:00
|
|
|
%pkg: include/config/kernel.release FORCE
|
2006-03-21 07:22:35 +01:00
|
|
|
$(Q)$(MAKE) $(build)=$(package-dir) $@
|
2006-06-09 07:12:37 +02:00
|
|
|
rpm: include/config/kernel.release FORCE
|
2006-03-21 07:22:35 +01:00
|
|
|
$(Q)$(MAKE) $(build)=$(package-dir) $@
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
|
|
|
|
# Brief documentation of the typical targets used
|
|
|
|
# ---------------------------------------------------------------------------
|
|
|
|
|
2008-04-06 22:16:07 +02:00
|
|
|
boards := $(wildcard $(srctree)/arch/$(SRCARCH)/configs/*_defconfig)
|
2014-10-28 14:18:20 +01:00
|
|
|
boards := $(sort $(notdir $(boards)))
|
2008-04-06 22:16:07 +02:00
|
|
|
board-dirs := $(dir $(wildcard $(srctree)/arch/$(SRCARCH)/configs/*/*_defconfig))
|
|
|
|
board-dirs := $(sort $(notdir $(board-dirs:/=)))
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
help:
|
|
|
|
@echo 'Cleaning targets:'
|
2006-12-12 19:09:40 +01:00
|
|
|
@echo ' clean - Remove most generated files but keep the config and'
|
2006-09-24 14:01:08 +02:00
|
|
|
@echo ' enough build support to build external modules'
|
2006-12-12 19:09:40 +01:00
|
|
|
@echo ' mrproper - Remove all generated files + config + various backup files'
|
2006-09-24 14:01:08 +02:00
|
|
|
@echo ' distclean - mrproper + remove editor backup and patch files'
|
2005-04-17 00:20:36 +02:00
|
|
|
@echo ''
|
|
|
|
@echo 'Configuration targets:'
|
|
|
|
@$(MAKE) -f $(srctree)/scripts/kconfig/Makefile help
|
|
|
|
@echo ''
|
|
|
|
@echo 'Other generic targets:'
|
|
|
|
@echo ' all - Build all targets marked with [*]'
|
|
|
|
@echo '* vmlinux - Build the bare kernel'
|
|
|
|
@echo '* modules - Build all modules'
|
2005-11-23 20:11:34 +01:00
|
|
|
@echo ' modules_install - Install all modules to INSTALL_MOD_PATH (default: /)'
|
2008-05-29 10:01:51 +02:00
|
|
|
@echo ' firmware_install- Install all firmware to INSTALL_FW_PATH'
|
|
|
|
@echo ' (default: $$(INSTALL_MOD_PATH)/lib/firmware)'
|
2005-04-17 00:20:36 +02:00
|
|
|
@echo ' dir/ - Build all files in dir and below'
|
2010-01-13 18:31:44 +01:00
|
|
|
@echo ' dir/file.[oisS] - Build specified target only'
|
|
|
|
@echo ' dir/file.lst - Build specified mixed source/assembly target only'
|
|
|
|
@echo ' (requires a recent binutils and recent build (System.map))'
|
2005-07-08 02:56:08 +02:00
|
|
|
@echo ' dir/file.ko - Build module including final link'
|
2009-04-24 18:35:23 +02:00
|
|
|
@echo ' modules_prepare - Set up for building external modules'
|
2005-04-17 00:20:36 +02:00
|
|
|
@echo ' tags/TAGS - Generate tags file for editors'
|
|
|
|
@echo ' cscope - Generate cscope index'
|
2011-01-14 13:07:05 +01:00
|
|
|
@echo ' gtags - Generate GNU GLOBAL index'
|
2014-07-11 15:57:24 +02:00
|
|
|
@echo ' kernelrelease - Output the release version string (use with make -s)'
|
|
|
|
@echo ' kernelversion - Output the version stored in Makefile (use with make -s)'
|
|
|
|
@echo ' image_name - Output the image name (use with make -s)'
|
2008-06-21 00:24:17 +02:00
|
|
|
@echo ' headers_install - Install sanitised kernel headers to INSTALL_HDR_PATH'; \
|
2007-01-29 13:47:01 +01:00
|
|
|
echo ' (default: $(INSTALL_HDR_PATH))'; \
|
2008-06-21 00:24:17 +02:00
|
|
|
echo ''
|
2005-04-17 00:20:36 +02:00
|
|
|
@echo 'Static analysers'
|
|
|
|
@echo ' checkstack - Generate a list of stack hogs'
|
|
|
|
@echo ' namespacecheck - Name space analysis on compiled kernel'
|
2007-11-14 21:34:55 +01:00
|
|
|
@echo ' versioncheck - Sanity check on version.h usage'
|
2007-11-04 21:01:55 +01:00
|
|
|
@echo ' includecheck - Check for duplicate included header files'
|
2007-08-24 23:04:56 +02:00
|
|
|
@echo ' export_report - List the usages of all exported symbols'
|
2008-12-16 12:33:43 +01:00
|
|
|
@echo ' headers_check - Sanity check on exported headers'
|
2010-06-06 17:15:01 +02:00
|
|
|
@echo ' headerdep - Detect inclusion cycles in headers'
|
|
|
|
@$(MAKE) -f $(srctree)/scripts/Makefile.help checker-help
|
|
|
|
@echo ''
|
2014-08-07 21:07:46 +02:00
|
|
|
@echo 'Kernel selftest'
|
|
|
|
@echo ' kselftest - Build and run kernel selftest (run as root)'
|
|
|
|
@echo ' Build, install, and boot kernel before'
|
|
|
|
@echo ' running kselftest on it'
|
|
|
|
@echo ''
|
2005-04-17 00:20:36 +02:00
|
|
|
@echo 'Kernel packaging:'
|
2006-03-21 07:22:35 +01:00
|
|
|
@$(MAKE) $(build)=$(package-dir) help
|
2005-04-17 00:20:36 +02:00
|
|
|
@echo ''
|
|
|
|
@echo 'Documentation targets:'
|
|
|
|
@$(MAKE) -f $(srctree)/Documentation/DocBook/Makefile dochelp
|
|
|
|
@echo ''
|
2008-04-26 04:34:58 +02:00
|
|
|
@echo 'Architecture specific targets ($(SRCARCH)):'
|
2005-04-17 00:20:36 +02:00
|
|
|
@$(if $(archhelp),$(archhelp),\
|
2008-04-26 04:34:58 +02:00
|
|
|
echo ' No architecture specific help defined for $(SRCARCH)')
|
2005-04-17 00:20:36 +02:00
|
|
|
@echo ''
|
|
|
|
@$(if $(boards), \
|
|
|
|
$(foreach b, $(boards), \
|
|
|
|
printf " %-24s - Build for %s\\n" $(b) $(subst _defconfig,,$(b));) \
|
|
|
|
echo '')
|
2008-04-06 22:16:07 +02:00
|
|
|
@$(if $(board-dirs), \
|
|
|
|
$(foreach b, $(board-dirs), \
|
|
|
|
printf " %-16s - Show %s-specific targets\\n" help-$(b) $(b);) \
|
|
|
|
printf " %-16s - Show all of the above\\n" help-boards; \
|
|
|
|
echo '')
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
@echo ' make V=0|1 [targets] 0 => quiet build (default), 1 => verbose build'
|
2006-08-08 21:35:14 +02:00
|
|
|
@echo ' make V=2 [targets] 2 => give reason for rebuild of target'
|
2005-04-17 00:20:36 +02:00
|
|
|
@echo ' make O=dir [targets] Locate all output files in "dir", including .config'
|
2006-05-23 22:57:23 +02:00
|
|
|
@echo ' make C=1 [targets] Check all c source with $$CHECK (sparse by default)'
|
|
|
|
@echo ' make C=2 [targets] Force check of all c source with $$CHECK'
|
2011-06-16 13:26:23 +02:00
|
|
|
@echo ' make RECORDMCOUNT_WARN=1 [targets] Warn about ignored mcount sections'
|
2011-04-27 22:15:27 +02:00
|
|
|
@echo ' make W=n [targets] Enable extra gcc checks, n=1,2,3 where'
|
|
|
|
@echo ' 1: warnings which may be relevant and do not occur too often'
|
|
|
|
@echo ' 2: warnings which occur quite often but may still be relevant'
|
|
|
|
@echo ' 3: more obscure warnings, can most likely be ignored'
|
2011-04-29 14:45:31 +02:00
|
|
|
@echo ' Multiple levels can be combined with W=12 or W=123'
|
2005-04-17 00:20:36 +02:00
|
|
|
@echo ''
|
|
|
|
@echo 'Execute "make" or "make all" to build all targets marked with [*] '
|
|
|
|
@echo 'For further info see the ./README file'
|
|
|
|
|
|
|
|
|
2008-04-06 22:16:07 +02:00
|
|
|
help-board-dirs := $(addprefix help-,$(board-dirs))
|
|
|
|
|
|
|
|
help-boards: $(help-board-dirs)
|
|
|
|
|
2014-11-28 13:31:43 +01:00
|
|
|
boards-per-dir = $(sort $(notdir $(wildcard $(srctree)/arch/$(SRCARCH)/configs/$*/*_defconfig)))
|
2008-04-06 22:16:07 +02:00
|
|
|
|
|
|
|
$(help-board-dirs): help-%:
|
|
|
|
@echo 'Architecture specific targets ($(SRCARCH) $*):'
|
|
|
|
@$(if $(boards-per-dir), \
|
|
|
|
$(foreach b, $(boards-per-dir), \
|
|
|
|
printf " %-24s - Build for %s\\n" $*/$(b) $(subst _defconfig,,$(b));) \
|
|
|
|
echo '')
|
|
|
|
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
# Documentation targets
|
|
|
|
# ---------------------------------------------------------------------------
|
|
|
|
%docs: scripts_basic FORCE
|
2011-05-02 22:48:03 +02:00
|
|
|
$(Q)$(MAKE) $(build)=scripts build_docproc
|
2005-04-17 00:20:36 +02:00
|
|
|
$(Q)$(MAKE) $(build)=Documentation/DocBook $@
|
|
|
|
|
|
|
|
else # KBUILD_EXTMOD
|
|
|
|
|
|
|
|
###
|
|
|
|
# External module support.
|
|
|
|
# When building external modules the kernel used as basis is considered
|
|
|
|
# read-only, and no consistency checks are made and the make
|
|
|
|
# system is not used on the basis kernel. If updates are required
|
|
|
|
# in the basis kernel ordinary make commands (without M=...) must
|
|
|
|
# be used.
|
|
|
|
#
|
|
|
|
# The following are the only valid targets when building external
|
|
|
|
# modules.
|
|
|
|
# make M=dir clean Delete all automatically generated files
|
|
|
|
# make M=dir modules Make all modules in specified dir
|
|
|
|
# make M=dir Same as 'make M=dir modules'
|
|
|
|
# make M=dir modules_install
|
2006-06-25 00:07:55 +02:00
|
|
|
# Install the modules built in the module directory
|
2005-04-17 00:20:36 +02:00
|
|
|
# Assumes install directory is already created
|
|
|
|
|
|
|
|
# We are always building modules
|
|
|
|
KBUILD_MODULES := 1
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += crmodverdir
|
2005-04-17 00:20:36 +02:00
|
|
|
crmodverdir:
|
2007-10-19 22:20:02 +02:00
|
|
|
$(cmd_crmodverdir)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += $(objtree)/Module.symvers
|
2005-04-17 00:20:36 +02:00
|
|
|
$(objtree)/Module.symvers:
|
|
|
|
@test -e $(objtree)/Module.symvers || ( \
|
|
|
|
echo; \
|
|
|
|
echo " WARNING: Symbol version dump $(objtree)/Module.symvers"; \
|
|
|
|
echo " is missing; modules will have no dependencies and modversions."; \
|
|
|
|
echo )
|
|
|
|
|
|
|
|
module-dirs := $(addprefix _module_,$(KBUILD_EXTMOD))
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += $(module-dirs) modules
|
2005-04-17 00:20:36 +02:00
|
|
|
$(module-dirs): crmodverdir $(objtree)/Module.symvers
|
|
|
|
$(Q)$(MAKE) $(build)=$(patsubst _module_%,%,$@)
|
|
|
|
|
|
|
|
modules: $(module-dirs)
|
2008-11-06 09:31:35 +01:00
|
|
|
@$(kecho) ' Building modules, stage 2.';
|
2006-08-08 21:36:08 +02:00
|
|
|
$(Q)$(MAKE) -f $(srctree)/scripts/Makefile.modpost
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += modules_install
|
2006-01-28 23:51:57 +01:00
|
|
|
modules_install: _emodinst_ _emodinst_post
|
2006-02-14 15:58:15 +01:00
|
|
|
|
2006-03-05 23:14:10 +01:00
|
|
|
install-dir := $(if $(INSTALL_MOD_DIR),$(INSTALL_MOD_DIR),extra)
|
|
|
|
PHONY += _emodinst_
|
2006-01-28 23:51:57 +01:00
|
|
|
_emodinst_:
|
|
|
|
$(Q)mkdir -p $(MODLIB)/$(install-dir)
|
2006-08-08 21:36:08 +02:00
|
|
|
$(Q)$(MAKE) -f $(srctree)/scripts/Makefile.modinst
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += _emodinst_post
|
2006-01-28 23:51:57 +01:00
|
|
|
_emodinst_post: _emodinst_
|
|
|
|
$(call cmd,depmod)
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
clean-dirs := $(addprefix _clean_,$(KBUILD_EXTMOD))
|
|
|
|
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += $(clean-dirs) clean
|
2005-04-17 00:20:36 +02:00
|
|
|
$(clean-dirs):
|
|
|
|
$(Q)$(MAKE) $(clean)=$(patsubst _clean_%,%,$@)
|
|
|
|
|
|
|
|
clean: rm-dirs := $(MODVERDIR)
|
2010-09-06 12:00:08 +02:00
|
|
|
clean: rm-files := $(KBUILD_EXTMOD)/Module.symvers
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
help:
|
|
|
|
@echo ' Building external modules.'
|
|
|
|
@echo ' Syntax: make -C path/to/kernel/src M=$$PWD target'
|
|
|
|
@echo ''
|
|
|
|
@echo ' modules - default target, build the module(s)'
|
|
|
|
@echo ' modules_install - install the module'
|
|
|
|
@echo ' clean - remove generated files in module directory only'
|
|
|
|
@echo ''
|
2006-01-25 07:13:18 +01:00
|
|
|
|
|
|
|
# Dummies...
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += prepare scripts
|
2006-01-25 07:13:18 +01:00
|
|
|
prepare: ;
|
|
|
|
scripts: ;
|
2005-04-17 00:20:36 +02:00
|
|
|
endif # KBUILD_EXTMOD
|
|
|
|
|
2010-09-06 12:00:08 +02:00
|
|
|
clean: $(clean-dirs)
|
|
|
|
$(call cmd,rmdirs)
|
|
|
|
$(call cmd,rmfiles)
|
2011-05-11 00:47:16 +02:00
|
|
|
@find $(if $(KBUILD_EXTMOD), $(KBUILD_EXTMOD), .) $(RCS_FIND_IGNORE) \
|
2010-09-06 12:00:08 +02:00
|
|
|
\( -name '*.[oas]' -o -name '*.ko' -o -name '.*.cmd' \
|
2012-09-26 11:09:50 +02:00
|
|
|
-o -name '*.ko.*' \
|
2014-07-30 20:50:18 +02:00
|
|
|
-o -name '*.dwo' \
|
2010-09-06 12:00:08 +02:00
|
|
|
-o -name '.*.d' -o -name '.*.tmp' -o -name '*.mod.c' \
|
|
|
|
-o -name '*.symtypes' -o -name 'modules.order' \
|
|
|
|
-o -name modules.builtin -o -name '.tmp_*.o.*' \
|
|
|
|
-o -name '*.gcno' \) -type f -print | xargs rm -f
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
# Generate tags for editors
|
|
|
|
# ---------------------------------------------------------------------------
|
2008-12-03 22:24:13 +01:00
|
|
|
quiet_cmd_tags = GEN $@
|
|
|
|
cmd_tags = $(CONFIG_SHELL) $(srctree)/scripts/tags.sh $@
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2011-01-14 13:07:05 +01:00
|
|
|
tags TAGS cscope gtags: FORCE
|
2005-04-17 00:20:36 +02:00
|
|
|
$(call cmd,tags)
|
|
|
|
|
|
|
|
# Scripts to check various things for consistency
|
|
|
|
# ---------------------------------------------------------------------------
|
|
|
|
|
2011-04-26 23:15:01 +02:00
|
|
|
PHONY += includecheck versioncheck coccicheck namespacecheck export_report
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
includecheck:
|
2011-04-26 23:18:29 +02:00
|
|
|
find $(srctree)/* $(RCS_FIND_IGNORE) \
|
2005-04-17 00:20:36 +02:00
|
|
|
-name '*.[hcS]' -type f -print | sort \
|
2007-11-05 11:51:44 +01:00
|
|
|
| xargs $(PERL) -w $(srctree)/scripts/checkincludes.pl
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
versioncheck:
|
2011-04-26 23:19:28 +02:00
|
|
|
find $(srctree)/* $(RCS_FIND_IGNORE) \
|
2005-04-17 00:20:36 +02:00
|
|
|
-name '*.[hcS]' -type f -print | sort \
|
2007-11-05 11:51:44 +01:00
|
|
|
| xargs $(PERL) -w $(srctree)/scripts/checkversion.pl
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2010-06-06 17:15:01 +02:00
|
|
|
coccicheck:
|
|
|
|
$(Q)$(CONFIG_SHELL) $(srctree)/scripts/$@
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
namespacecheck:
|
|
|
|
$(PERL) $(srctree)/scripts/namespace.pl
|
|
|
|
|
2007-08-24 23:04:56 +02:00
|
|
|
export_report:
|
|
|
|
$(PERL) $(srctree)/scripts/export_report.pl
|
|
|
|
|
2005-04-17 00:20:36 +02:00
|
|
|
endif #ifeq ($(config-targets),1)
|
|
|
|
endif #ifeq ($(mixed-targets),1)
|
|
|
|
|
2013-06-24 14:48:37 +02:00
|
|
|
PHONY += checkstack kernelrelease kernelversion image_name
|
2006-09-27 10:50:37 +02:00
|
|
|
|
2006-12-13 09:34:12 +01:00
|
|
|
# UML needs a little special treatment here. It wants to use the host
|
|
|
|
# toolchain, so needs $(SUBARCH) passed to checkstack.pl. Everyone
|
|
|
|
# else wants $(ARCH), including people doing cross-builds, which means
|
|
|
|
# that $(SUBARCH) doesn't work here.
|
|
|
|
ifeq ($(ARCH), um)
|
|
|
|
CHECKSTACK_ARCH := $(SUBARCH)
|
|
|
|
else
|
|
|
|
CHECKSTACK_ARCH := $(ARCH)
|
|
|
|
endif
|
2005-04-17 00:20:36 +02:00
|
|
|
checkstack:
|
|
|
|
$(OBJDUMP) -d vmlinux $$(find . -name '*.ko') | \
|
2006-12-13 09:34:12 +01:00
|
|
|
$(PERL) $(src)/scripts/checkstack.pl $(CHECKSTACK_ARCH)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2010-08-20 11:36:06 +02:00
|
|
|
kernelrelease:
|
|
|
|
@echo "$(KERNELVERSION)$$($(CONFIG_SHELL) $(srctree)/scripts/setlocalversion $(srctree))"
|
2010-06-28 04:45:21 +02:00
|
|
|
|
2006-01-09 21:20:34 +01:00
|
|
|
kernelversion:
|
2006-01-16 12:12:12 +01:00
|
|
|
@echo $(KERNELVERSION)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
2013-06-24 14:48:37 +02:00
|
|
|
image_name:
|
|
|
|
@echo $(KBUILD_IMAGE)
|
|
|
|
|
2012-04-11 18:36:18 +02:00
|
|
|
# Clear a bunch of variables before executing the submake
|
|
|
|
tools/: FORCE
|
2012-11-05 22:02:08 +01:00
|
|
|
$(Q)mkdir -p $(objtree)/tools
|
2013-02-20 16:32:28 +01:00
|
|
|
$(Q)$(MAKE) LDFLAGS= MAKEFLAGS="$(filter --j% -j,$(MAKEFLAGS))" O=$(objtree) subdir=tools -C $(src)/tools/
|
2012-04-11 18:36:18 +02:00
|
|
|
|
|
|
|
tools/%: FORCE
|
2012-11-05 22:02:08 +01:00
|
|
|
$(Q)mkdir -p $(objtree)/tools
|
2013-02-20 16:32:28 +01:00
|
|
|
$(Q)$(MAKE) LDFLAGS= MAKEFLAGS="$(filter --j% -j,$(MAKEFLAGS))" O=$(objtree) subdir=tools -C $(src)/tools/ $*
|
2012-04-11 18:36:18 +02:00
|
|
|
|
2006-01-25 07:13:18 +01:00
|
|
|
# Single targets
|
|
|
|
# ---------------------------------------------------------------------------
|
2006-04-05 12:57:21 +02:00
|
|
|
# Single targets are compatible with:
|
2008-02-03 14:14:02 +01:00
|
|
|
# - build with mixed source and output
|
2006-04-05 12:57:21 +02:00
|
|
|
# - build with separate output dir 'make O=...'
|
|
|
|
# - external modules
|
|
|
|
#
|
|
|
|
# target-dir => where to store outputfile
|
|
|
|
# build-dir => directory in kernel source tree to use
|
|
|
|
|
|
|
|
ifeq ($(KBUILD_EXTMOD),)
|
2006-04-06 08:25:31 +02:00
|
|
|
build-dir = $(patsubst %/,%,$(dir $@))
|
2006-04-05 12:57:21 +02:00
|
|
|
target-dir = $(dir $@)
|
|
|
|
else
|
|
|
|
zap-slash=$(filter-out .,$(patsubst %/,%,$(dir $@)))
|
|
|
|
build-dir = $(KBUILD_EXTMOD)$(if $(zap-slash),/$(zap-slash))
|
|
|
|
target-dir = $(if $(KBUILD_EXTMOD),$(dir $<),$(dir $@))
|
|
|
|
endif
|
|
|
|
|
2006-03-05 12:10:58 +01:00
|
|
|
%.s: %.c prepare scripts FORCE
|
2006-04-05 12:57:21 +02:00
|
|
|
$(Q)$(MAKE) $(build)=$(build-dir) $(target-dir)$(notdir $@)
|
2006-03-05 12:10:58 +01:00
|
|
|
%.i: %.c prepare scripts FORCE
|
2006-04-05 12:57:21 +02:00
|
|
|
$(Q)$(MAKE) $(build)=$(build-dir) $(target-dir)$(notdir $@)
|
2006-03-05 12:10:58 +01:00
|
|
|
%.o: %.c prepare scripts FORCE
|
2006-04-05 12:57:21 +02:00
|
|
|
$(Q)$(MAKE) $(build)=$(build-dir) $(target-dir)$(notdir $@)
|
2006-03-05 12:10:58 +01:00
|
|
|
%.lst: %.c prepare scripts FORCE
|
2006-04-05 12:57:21 +02:00
|
|
|
$(Q)$(MAKE) $(build)=$(build-dir) $(target-dir)$(notdir $@)
|
2006-03-05 12:10:58 +01:00
|
|
|
%.s: %.S prepare scripts FORCE
|
2006-04-05 12:57:21 +02:00
|
|
|
$(Q)$(MAKE) $(build)=$(build-dir) $(target-dir)$(notdir $@)
|
2006-03-05 12:10:58 +01:00
|
|
|
%.o: %.S prepare scripts FORCE
|
2006-04-05 12:57:21 +02:00
|
|
|
$(Q)$(MAKE) $(build)=$(build-dir) $(target-dir)$(notdir $@)
|
kbuild: support for %.symtypes files
Here is a patch that adds a new -T option to genksyms for generating dumps of
the type definition that makes up the symbol version hashes. This allows to
trace modversion changes back to what caused them. The dump format is the
name of the type defined, followed by its definition (which is almost C):
s#list_head struct list_head { s#list_head * next , * prev ; }
The s#, u#, e#, and t# prefixes stand for struct, union, enum, and typedef.
The exported symbols do not define types, and thus do not have an x# prefix:
nfs4_acl_get_whotype int nfs4_acl_get_whotype ( char * , t#u32 )
The symbol type defintion of a single file can be generated with:
make fs/jbd/journal.symtypes
If KBUILD_SYMTYPES is defined, all the *.symtypes of all object files that
export symbols are generated.
The single *.symtypes files can be combined into a single file after a kernel
build with a script like the following:
for f in $(find -name '*.symtypes' | sort); do
f=${f#./}
echo "/* ${f%.symtypes}.o */"
cat $f
echo
done \
| sed -e '\:UNKNOWN:d' \
-e 's:[,;] }:}:g' \
-e 's:\([[({]\) :\1:g' \
-e 's: \([])},;]\):\1:g' \
-e 's: $::' \
$f \
| awk '
/^.#/ { if (defined[$1] == $0) {
print $1
next
}
defined[$1] = $0
}
{ print }
'
When the kernel ABI changes, diffing individual *.symtype files, or the
combined files, against each other will show which symbol changes caused the
ABI changes. This can save a tremendous amount of time.
Dump the types that make up modversions
Signed-off-by: Andreas Gruenbacher <agruen@suse.de>
Signed-off-by: Sam Ravnborg <sam@ravnborg.org>
2006-05-09 20:37:30 +02:00
|
|
|
%.symtypes: %.c prepare scripts FORCE
|
|
|
|
$(Q)$(MAKE) $(build)=$(build-dir) $(target-dir)$(notdir $@)
|
2006-01-25 07:13:18 +01:00
|
|
|
|
2006-04-05 12:57:21 +02:00
|
|
|
# Modules
|
2008-12-13 23:00:45 +01:00
|
|
|
/: prepare scripts FORCE
|
|
|
|
$(cmd_crmodverdir)
|
|
|
|
$(Q)$(MAKE) KBUILD_MODULES=$(if $(CONFIG_MODULES),1) \
|
|
|
|
$(build)=$(build-dir)
|
2014-09-25 20:23:58 +02:00
|
|
|
# Make sure the latest headers are built for Documentation
|
|
|
|
Documentation/: headers_install
|
2008-12-13 23:00:45 +01:00
|
|
|
%/: prepare scripts FORCE
|
2007-10-19 22:20:02 +02:00
|
|
|
$(cmd_crmodverdir)
|
2006-01-25 07:13:18 +01:00
|
|
|
$(Q)$(MAKE) KBUILD_MODULES=$(if $(CONFIG_MODULES),1) \
|
2006-04-05 12:57:21 +02:00
|
|
|
$(build)=$(build-dir)
|
|
|
|
%.ko: prepare scripts FORCE
|
2007-10-19 22:20:02 +02:00
|
|
|
$(cmd_crmodverdir)
|
2006-01-25 07:13:18 +01:00
|
|
|
$(Q)$(MAKE) KBUILD_MODULES=$(if $(CONFIG_MODULES),1) \
|
2006-04-05 12:57:21 +02:00
|
|
|
$(build)=$(build-dir) $(@:.ko=.o)
|
2006-08-08 21:36:08 +02:00
|
|
|
$(Q)$(MAKE) -f $(srctree)/scripts/Makefile.modpost
|
2006-01-25 07:13:18 +01:00
|
|
|
|
2014-04-28 09:26:18 +02:00
|
|
|
# FIXME Should go into a make.lib or something
|
2005-04-17 00:20:36 +02:00
|
|
|
# ===========================================================================
|
|
|
|
|
|
|
|
quiet_cmd_rmdirs = $(if $(wildcard $(rm-dirs)),CLEAN $(wildcard $(rm-dirs)))
|
|
|
|
cmd_rmdirs = rm -rf $(rm-dirs)
|
|
|
|
|
|
|
|
quiet_cmd_rmfiles = $(if $(wildcard $(rm-files)),CLEAN $(wildcard $(rm-files)))
|
|
|
|
cmd_rmfiles = rm -f $(rm-files)
|
|
|
|
|
2008-04-22 00:53:56 +02:00
|
|
|
# Run depmod only if we have System.map and depmod is executable
|
2007-10-18 21:24:21 +02:00
|
|
|
quiet_cmd_depmod = DEPMOD $(KERNELRELEASE)
|
2011-06-15 22:15:47 +02:00
|
|
|
cmd_depmod = $(CONFIG_SHELL) $(srctree)/scripts/depmod.sh $(DEPMOD) \
|
2013-03-15 05:34:17 +01:00
|
|
|
$(KERNELRELEASE) "$(patsubst y,_,$(CONFIG_HAVE_UNDERSCORE_SYMBOL_PREFIX))"
|
2007-10-18 21:24:21 +02:00
|
|
|
|
2007-10-19 22:20:02 +02:00
|
|
|
# Create temporary dir for module support files
|
2007-10-22 11:23:07 +02:00
|
|
|
# clean it up only when building all modules
|
|
|
|
cmd_crmodverdir = $(Q)mkdir -p $(MODVERDIR) \
|
|
|
|
$(if $(KBUILD_MODULES),; rm -f $(MODVERDIR)/*)
|
2005-04-17 00:20:36 +02:00
|
|
|
|
|
|
|
# read all saved command lines
|
|
|
|
|
|
|
|
targets := $(wildcard $(sort $(targets)))
|
|
|
|
cmd_files := $(wildcard .*.cmd $(foreach f,$(targets),$(dir $(f)).$(notdir $(f)).cmd))
|
|
|
|
|
|
|
|
ifneq ($(cmd_files),)
|
|
|
|
$(cmd_files): ; # Do not try to update included dependency files
|
|
|
|
include $(cmd_files)
|
|
|
|
endif
|
|
|
|
|
|
|
|
endif # skip-makefile
|
|
|
|
|
2006-03-05 23:14:10 +01:00
|
|
|
PHONY += FORCE
|
2005-04-17 00:20:36 +02:00
|
|
|
FORCE:
|
2006-03-05 23:14:10 +01:00
|
|
|
|
|
|
|
# Declare the contents of the .PHONY variable as phony. We keep that
|
2009-04-09 13:34:34 +02:00
|
|
|
# information in a variable so we can use it in if_changed and friends.
|
2006-03-05 23:14:10 +01:00
|
|
|
.PHONY: $(PHONY)
|