Greg Kroah-Hartman | b244131 | 2017-11-01 15:07:57 +0100 | [diff] [blame] | 1 | # SPDX-License-Identifier: GPL-2.0 |
Ard Biesheuvel | f4f75ad5 | 2014-07-02 14:54:43 +0200 | [diff] [blame] | 2 | # |
| 3 | # The stub may be linked into the kernel proper or into a separate boot binary, |
| 4 | # but in either case, it executes before the kernel does (with MMU disabled) so |
| 5 | # things like ftrace and stack-protector are likely to cause trouble if left |
| 6 | # enabled, even if doing so doesn't break the build. |
| 7 | # |
| 8 | cflags-$(CONFIG_X86_32) := -march=i386 |
| 9 | cflags-$(CONFIG_X86_64) := -mcmodel=small |
Paul Bolle | 846221c | 2016-11-03 09:53:50 +0100 | [diff] [blame] | 10 | cflags-$(CONFIG_X86) += -m$(BITS) -D__KERNEL__ -O2 \ |
Ard Biesheuvel | f4f75ad5 | 2014-07-02 14:54:43 +0200 | [diff] [blame] | 11 | -fPIC -fno-strict-aliasing -mno-red-zone \ |
Ard Biesheuvel | 36b6497 | 2018-03-12 08:45:00 +0000 | [diff] [blame] | 12 | -mno-mmx -mno-sse -fshort-wchar |
Ard Biesheuvel | f4f75ad5 | 2014-07-02 14:54:43 +0200 | [diff] [blame] | 13 | |
Laura Abbott | ce279d3 | 2018-07-30 11:31:18 -0700 | [diff] [blame] | 14 | # arm64 uses the full KBUILD_CFLAGS so it's necessary to explicitly |
| 15 | # disable the stackleak plugin |
| 16 | cflags-$(CONFIG_ARM64) := $(subst -pg,,$(KBUILD_CFLAGS)) -fpie \ |
| 17 | $(DISABLE_STACKLEAK_PLUGIN) |
Ard Biesheuvel | 696204fa | 2017-01-31 13:21:42 +0000 | [diff] [blame] | 18 | cflags-$(CONFIG_ARM) := $(subst -pg,,$(KBUILD_CFLAGS)) \ |
Alistair Strachan | 41f1c48 | 2018-08-09 09:40:42 -0700 | [diff] [blame] | 19 | -fno-builtin -fpic \ |
| 20 | $(call cc-option,-mno-single-pic-base) |
Ard Biesheuvel | f4f75ad5 | 2014-07-02 14:54:43 +0200 | [diff] [blame] | 21 | |
Ard Biesheuvel | e8f3010 | 2015-10-08 20:02:04 +0100 | [diff] [blame] | 22 | cflags-$(CONFIG_EFI_ARMSTUB) += -I$(srctree)/scripts/dtc/libfdt |
| 23 | |
Ard Biesheuvel | b523e18 | 2015-12-23 10:29:28 +0100 | [diff] [blame] | 24 | KBUILD_CFLAGS := $(cflags-y) -DDISABLE_BRANCH_PROFILING \ |
Kees Cook | 3e2c044 | 2017-07-12 14:35:55 -0700 | [diff] [blame] | 25 | -D__NO_FORTIFY \ |
Ard Biesheuvel | f4f75ad5 | 2014-07-02 14:54:43 +0200 | [diff] [blame] | 26 | $(call cc-option,-ffreestanding) \ |
Laura Abbott | 0b3e336 | 2018-07-20 14:41:54 -0700 | [diff] [blame] | 27 | $(call cc-option,-fno-stack-protector) \ |
Ard Biesheuvel | f922c4a | 2018-08-21 21:56:04 -0700 | [diff] [blame] | 28 | -D__DISABLE_EXPORTS |
Ard Biesheuvel | f4f75ad5 | 2014-07-02 14:54:43 +0200 | [diff] [blame] | 29 | |
| 30 | GCOV_PROFILE := n |
Andrey Ryabinin | 0b24bec | 2015-02-13 14:39:17 -0800 | [diff] [blame] | 31 | KASAN_SANITIZE := n |
Andrey Ryabinin | c6d3085 | 2016-01-20 15:00:55 -0800 | [diff] [blame] | 32 | UBSAN_SANITIZE := n |
Josh Poimboeuf | c0dd671686 | 2016-02-28 22:22:34 -0600 | [diff] [blame] | 33 | OBJECT_FILES_NON_STANDARD := y |
Ard Biesheuvel | f4f75ad5 | 2014-07-02 14:54:43 +0200 | [diff] [blame] | 34 | |
Dmitry Vyukov | 5c9a875 | 2016-03-22 14:27:30 -0700 | [diff] [blame] | 35 | # Prevents link failures: __sanitizer_cov_trace_pc() is not linked in. |
| 36 | KCOV_INSTRUMENT := n |
| 37 | |
Thiebaud Weksteen | 33b6d03 | 2017-09-20 10:13:39 +0200 | [diff] [blame] | 38 | lib-y := efi-stub-helper.o gop.o secureboot.o tpm.o |
Ard Biesheuvel | e8f3010 | 2015-10-08 20:02:04 +0100 | [diff] [blame] | 39 | |
| 40 | # include the stub's generic dependencies from lib/ when building for ARM/arm64 |
Ard Biesheuvel | 29f9007 | 2017-10-22 15:14:57 +0100 | [diff] [blame] | 41 | arm-deps-y := fdt_rw.c fdt_ro.c fdt_wip.c fdt.c fdt_empty_tree.c fdt_sw.c |
| 42 | arm-deps-$(CONFIG_ARM64) += sort.c |
Ard Biesheuvel | e8f3010 | 2015-10-08 20:02:04 +0100 | [diff] [blame] | 43 | |
| 44 | $(obj)/lib-%.o: $(srctree)/lib/%.c FORCE |
| 45 | $(call if_changed_rule,cc_o_c) |
| 46 | |
Ard Biesheuvel | a6a1446 | 2016-11-12 21:32:32 +0000 | [diff] [blame] | 47 | lib-$(CONFIG_EFI_ARMSTUB) += arm-stub.o fdt.o string.o random.o \ |
Ard Biesheuvel | 29f9007 | 2017-10-22 15:14:57 +0100 | [diff] [blame] | 48 | $(patsubst %.c,lib-%.o,$(arm-deps-y)) |
Ard Biesheuvel | f4f75ad5 | 2014-07-02 14:54:43 +0200 | [diff] [blame] | 49 | |
Roy Franz | 81a0bc3 | 2015-09-23 20:17:54 -0700 | [diff] [blame] | 50 | lib-$(CONFIG_ARM) += arm32-stub.o |
Ard Biesheuvel | a6a1446 | 2016-11-12 21:32:32 +0000 | [diff] [blame] | 51 | lib-$(CONFIG_ARM64) += arm64-stub.o |
Ard Biesheuvel | bf45778 | 2015-10-23 16:48:14 +0200 | [diff] [blame] | 52 | CFLAGS_arm64-stub.o := -DTEXT_OFFSET=$(TEXT_OFFSET) |
| 53 | |
Ard Biesheuvel | ddeeefe | 2015-01-12 20:28:20 +0000 | [diff] [blame] | 54 | # |
| 55 | # arm64 puts the stub in the kernel proper, which will unnecessarily retain all |
| 56 | # code indefinitely unless it is annotated as __init/__initdata/__initconst etc. |
| 57 | # So let's apply the __init annotations at the section level, by prefixing |
| 58 | # the section names directly. This will ensure that even all the inline string |
| 59 | # literals are covered. |
Ard Biesheuvel | e8f3010 | 2015-10-08 20:02:04 +0100 | [diff] [blame] | 60 | # The fact that the stub and the kernel proper are essentially the same binary |
| 61 | # also means that we need to be extra careful to make sure that the stub does |
| 62 | # not rely on any absolute symbol references, considering that the virtual |
| 63 | # kernel mapping that the linker uses is not active yet when the stub is |
| 64 | # executing. So build all C dependencies of the EFI stub into libstub, and do |
| 65 | # a verification pass to see if any absolute relocations exist in any of the |
| 66 | # object files. |
Ard Biesheuvel | ddeeefe | 2015-01-12 20:28:20 +0000 | [diff] [blame] | 67 | # |
Ard Biesheuvel | e8f3010 | 2015-10-08 20:02:04 +0100 | [diff] [blame] | 68 | extra-$(CONFIG_EFI_ARMSTUB) := $(lib-y) |
| 69 | lib-$(CONFIG_EFI_ARMSTUB) := $(patsubst %.o,%.stub.o,$(lib-y)) |
Ard Biesheuvel | ddeeefe | 2015-01-12 20:28:20 +0000 | [diff] [blame] | 70 | |
Ard Biesheuvel | 696204fa | 2017-01-31 13:21:42 +0000 | [diff] [blame] | 71 | STUBCOPY_RM-y := -R *ksymtab* -R *kcrctab* |
Ard Biesheuvel | e8f3010 | 2015-10-08 20:02:04 +0100 | [diff] [blame] | 72 | STUBCOPY_FLAGS-$(CONFIG_ARM64) += --prefix-alloc-sections=.init \ |
| 73 | --prefix-symbols=__efistub_ |
| 74 | STUBCOPY_RELOC-$(CONFIG_ARM64) := R_AARCH64_ABS |
| 75 | |
| 76 | $(obj)/%.stub.o: $(obj)/%.o FORCE |
| 77 | $(call if_changed,stubcopy) |
| 78 | |
Ard Biesheuvel | 696204fa | 2017-01-31 13:21:42 +0000 | [diff] [blame] | 79 | # |
| 80 | # Strip debug sections and some other sections that may legally contain |
| 81 | # absolute relocations, so that we can inspect the remaining sections for |
| 82 | # such relocations. If none are found, regenerate the output object, but |
| 83 | # this time, use objcopy and leave all sections in place. |
| 84 | # |
Ard Biesheuvel | e8f3010 | 2015-10-08 20:02:04 +0100 | [diff] [blame] | 85 | quiet_cmd_stubcopy = STUBCPY $@ |
Ard Biesheuvel | 696204fa | 2017-01-31 13:21:42 +0000 | [diff] [blame] | 86 | cmd_stubcopy = if $(STRIP) --strip-debug $(STUBCOPY_RM-y) -o $@ $<; \ |
| 87 | then if $(OBJDUMP) -r $@ | grep $(STUBCOPY_RELOC-y); \ |
| 88 | then (echo >&2 "$@: absolute symbol references not allowed in the EFI stub"; \ |
| 89 | rm -f $@; /bin/false); \ |
| 90 | else $(OBJCOPY) $(STUBCOPY_FLAGS-y) $< $@; fi \ |
| 91 | else /bin/false; fi |
Roy Franz | 81a0bc3 | 2015-09-23 20:17:54 -0700 | [diff] [blame] | 92 | |
| 93 | # |
| 94 | # ARM discards the .data section because it disallows r/w data in the |
| 95 | # decompressor. So move our .data to .data.efistub, which is preserved |
| 96 | # explicitly by the decompressor linker script. |
| 97 | # |
Ard Biesheuvel | 696204fa | 2017-01-31 13:21:42 +0000 | [diff] [blame] | 98 | STUBCOPY_FLAGS-$(CONFIG_ARM) += --rename-section .data=.data.efistub |
Roy Franz | 81a0bc3 | 2015-09-23 20:17:54 -0700 | [diff] [blame] | 99 | STUBCOPY_RELOC-$(CONFIG_ARM) := R_ARM_ABS |