|
|
@@ -17,11 +17,34 @@ KCOV_INSTRUMENT := n
|
|
|
|
|
|
# Default KBUILD_CFLAGS can have -pg option set when FTRACE is enabled. That
|
|
|
# in turn leaves some undefined symbols like __fentry__ in purgatory and not
|
|
|
-# sure how to relocate those. Like kexec-tools, use custom flags.
|
|
|
-
|
|
|
-KBUILD_CFLAGS := -fno-strict-aliasing -Wall -Wstrict-prototypes -fno-zero-initialized-in-bss -fno-builtin -ffreestanding -c -Os -mcmodel=large
|
|
|
-KBUILD_CFLAGS += -m$(BITS)
|
|
|
-KBUILD_CFLAGS += $(call cc-option,-fno-PIE)
|
|
|
+# sure how to relocate those.
|
|
|
+ifdef CONFIG_FUNCTION_TRACER
|
|
|
+CFLAGS_REMOVE_sha256.o += $(CC_FLAGS_FTRACE)
|
|
|
+CFLAGS_REMOVE_purgatory.o += $(CC_FLAGS_FTRACE)
|
|
|
+CFLAGS_REMOVE_string.o += $(CC_FLAGS_FTRACE)
|
|
|
+CFLAGS_REMOVE_kexec-purgatory.o += $(CC_FLAGS_FTRACE)
|
|
|
+endif
|
|
|
+
|
|
|
+ifdef CONFIG_STACKPROTECTOR
|
|
|
+CFLAGS_REMOVE_sha256.o += -fstack-protector
|
|
|
+CFLAGS_REMOVE_purgatory.o += -fstack-protector
|
|
|
+CFLAGS_REMOVE_string.o += -fstack-protector
|
|
|
+CFLAGS_REMOVE_kexec-purgatory.o += -fstack-protector
|
|
|
+endif
|
|
|
+
|
|
|
+ifdef CONFIG_STACKPROTECTOR_STRONG
|
|
|
+CFLAGS_REMOVE_sha256.o += -fstack-protector-strong
|
|
|
+CFLAGS_REMOVE_purgatory.o += -fstack-protector-strong
|
|
|
+CFLAGS_REMOVE_string.o += -fstack-protector-strong
|
|
|
+CFLAGS_REMOVE_kexec-purgatory.o += -fstack-protector-strong
|
|
|
+endif
|
|
|
+
|
|
|
+ifdef CONFIG_RETPOLINE
|
|
|
+CFLAGS_REMOVE_sha256.o += $(RETPOLINE_CFLAGS)
|
|
|
+CFLAGS_REMOVE_purgatory.o += $(RETPOLINE_CFLAGS)
|
|
|
+CFLAGS_REMOVE_string.o += $(RETPOLINE_CFLAGS)
|
|
|
+CFLAGS_REMOVE_kexec-purgatory.o += $(RETPOLINE_CFLAGS)
|
|
|
+endif
|
|
|
|
|
|
$(obj)/purgatory.ro: $(PURGATORY_OBJS) FORCE
|
|
|
$(call if_changed,ld)
|