shm: wait for pins to be released when sealing
[linux-2.6-block.git] / kernel / Makefile
CommitLineData
1da177e4
LT
1#
2# Makefile for the linux kernel.
3#
4
b9ee979e 5obj-y = fork.o exec_domain.o panic.o \
5cee9645
TG
6 cpu.o exit.o softirq.o resource.o \
7 sysctl.o sysctl_binary.o capability.o ptrace.o user.o \
e73f8959 8 signal.o sys.o kmod.o workqueue.o pid.o task_work.o \
5cee9645
TG
9 extable.o params.o \
10 kthread.o sys_ni.o nsproxy.o \
15d94b82 11 notifier.o ksysfs.o cred.o reboot.o \
cd4d241d 12 async.o range.o groups.o smpboot.o
029632fb 13
606576ce 14ifdef CONFIG_FUNCTION_TRACER
6ec56232 15# Do not trace debug files and internal ftrace files
6ec56232 16CFLAGS_REMOVE_cgroup-debug.o = -pg
e360adbe 17CFLAGS_REMOVE_irq_work.o = -pg
1d09daa5
SR
18endif
19
58edae3a
AK
20# cond_syscall is currently not LTO compatible
21CFLAGS_sys_ni.o = $(DISABLE_LTO)
22
391e43da 23obj-y += sched/
01768b42 24obj-y += locking/
dae5cbc2 25obj-y += power/
b9ee979e 26obj-y += printk/
0244ad00 27obj-y += irq/
4102adab 28obj-y += rcu/
391e43da 29
1e142b29 30obj-$(CONFIG_CHECKPOINT_RESTORE) += kcmp.o
8174f150 31obj-$(CONFIG_FREEZER) += freezer.o
b03f6489 32obj-$(CONFIG_PROFILING) += profile.o
8637c099 33obj-$(CONFIG_STACKTRACE) += stacktrace.o
ad596171 34obj-y += time/
1da177e4 35obj-$(CONFIG_FUTEX) += futex.o
34f192c6
IM
36ifeq ($(CONFIG_COMPAT),y)
37obj-$(CONFIG_FUTEX) += futex_compat.o
38endif
1da177e4 39obj-$(CONFIG_GENERIC_ISA_DMA) += dma.o
351f8f8e 40obj-$(CONFIG_SMP) += smp.o
9316fcac 41ifneq ($(CONFIG_SMP),y)
53ce3d95
AM
42obj-y += up.o
43endif
1da177e4 44obj-$(CONFIG_UID16) += uid16.o
b56e5a17 45obj-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += system_keyring.o system_certificates.o
1da177e4 46obj-$(CONFIG_MODULES) += module.o
b56e5a17 47obj-$(CONFIG_MODULE_SIG) += module_signing.o
1da177e4 48obj-$(CONFIG_KALLSYMS) += kallsyms.o
1da177e4 49obj-$(CONFIG_BSD_PROCESS_ACCT) += acct.o
dc009d92 50obj-$(CONFIG_KEXEC) += kexec.o
6dab2778 51obj-$(CONFIG_BACKTRACE_SELF_TEST) += backtracetest.o
1da177e4 52obj-$(CONFIG_COMPAT) += compat.o
ddbcc7e8 53obj-$(CONFIG_CGROUPS) += cgroup.o
dc52ddc0 54obj-$(CONFIG_CGROUP_FREEZER) += cgroup_freezer.o
1da177e4 55obj-$(CONFIG_CPUSETS) += cpuset.o
aee16ce7
PE
56obj-$(CONFIG_UTS_NS) += utsname.o
57obj-$(CONFIG_USER_NS) += user_namespace.o
74bd59bb 58obj-$(CONFIG_PID_NS) += pid_namespace.o
1da177e4 59obj-$(CONFIG_IKCONFIG) += configs.o
e552b661 60obj-$(CONFIG_RESOURCE_COUNTERS) += res_counter.o
bbf1bb3e 61obj-$(CONFIG_SMP) += stop_machine.o
8c1c9356 62obj-$(CONFIG_KPROBES_SANITY_TEST) += test_kprobes.o
939a67fc 63obj-$(CONFIG_AUDIT) += audit.o auditfilter.o
1da177e4 64obj-$(CONFIG_AUDITSYSCALL) += auditsc.o
939a67fc 65obj-$(CONFIG_AUDIT_WATCH) += audit_watch.o
74c3cbe3 66obj-$(CONFIG_AUDIT_TREE) += audit_tree.o
939a67fc 67obj-$(CONFIG_GCOV_KERNEL) += gcov/
1da177e4 68obj-$(CONFIG_KPROBES) += kprobes.o
c4338209 69obj-$(CONFIG_KGDB) += debug/
e162b39a 70obj-$(CONFIG_DETECT_HUNG_TASK) += hung_task.o
58687acb 71obj-$(CONFIG_LOCKUP_DETECTOR) += watchdog.o
1da177e4 72obj-$(CONFIG_SECCOMP) += seccomp.o
b86ff981 73obj-$(CONFIG_RELAY) += relay.o
39732acd 74obj-$(CONFIG_SYSCTL) += utsname_sysctl.o
ca74e92b 75obj-$(CONFIG_TASK_DELAY_ACCT) += delayacct.o
f3cef7a9 76obj-$(CONFIG_TASKSTATS) += taskstats.o tsacct.o
97e1c18e 77obj-$(CONFIG_TRACEPOINTS) += tracepoint.o
9745512c 78obj-$(CONFIG_LATENCYTOP) += latencytop.o
1fcccbac
DH
79obj-$(CONFIG_BINFMT_ELF) += elfcore.o
80obj-$(CONFIG_COMPAT_BINFMT_ELF) += elfcore.o
81obj-$(CONFIG_BINFMT_ELF_FDPIC) += elfcore.o
606576ce 82obj-$(CONFIG_FUNCTION_TRACER) += trace/
bc0c38d1 83obj-$(CONFIG_TRACING) += trace/
ea632e9f 84obj-$(CONFIG_TRACE_CLOCK) += trace/
1155de47 85obj-$(CONFIG_RING_BUFFER) += trace/
870915e0 86obj-$(CONFIG_TRACEPOINTS) += trace/
e360adbe 87obj-$(CONFIG_IRQ_WORK) += irq_work.o
ab10023e 88obj-$(CONFIG_CPU_PM) += cpu_pm.o
f5bffecd 89obj-$(CONFIG_NET) += bpf/
fae85b7c
BP
90
91obj-$(CONFIG_PERF_EVENTS) += events/
92
7a041097 93obj-$(CONFIG_USER_RETURN_NOTIFIER) += user-return-notifier.o
16295bec 94obj-$(CONFIG_PADATA) += padata.o
93a72052 95obj-$(CONFIG_CRASH_DUMP) += crash_dump.o
b77f0f3c 96obj-$(CONFIG_JUMP_LABEL) += jump_label.o
91d1aa43 97obj-$(CONFIG_CONTEXT_TRACKING) += context_tracking.o
51b1130e 98obj-$(CONFIG_TORTURE_TEST) += torture.o
1da177e4 99
1da177e4
LT
100$(obj)/configs.o: $(obj)/config_data.h
101
102# config_data.h contains the same information as ikconfig.h but gzipped.
103# Info from config_data can be extracted from /proc/config*
104targets += config_data.gz
41263fc6 105$(obj)/config_data.gz: $(KCONFIG_CONFIG) FORCE
1da177e4
LT
106 $(call if_changed,gzip)
107
e78e8f2d 108 filechk_ikconfiggz = (echo "static const char kernel_config_data[] __used = MAGIC_START"; cat $< | scripts/bin2c; echo "MAGIC_END;")
1da177e4
LT
109targets += config_data.h
110$(obj)/config_data.h: $(obj)/config_data.gz FORCE
e78e8f2d 111 $(call filechk,ikconfiggz)
bdc80787 112
f0e6d220 113###############################################################################
631cc66e 114#
0fbd39cf 115# Roll all the X.509 certificates that we can find together and pull them into
b56e5a17
DH
116# the kernel so that they get loaded into the system trusted keyring during
117# boot.
631cc66e 118#
0fbd39cf
DH
119# We look in the source root and the build root for all files whose name ends
120# in ".x509". Unfortunately, this will generate duplicate filenames, so we
121# have make canonicalise the pathnames and then sort them to discard the
122# duplicates.
631cc66e 123#
f0e6d220 124###############################################################################
b56e5a17 125ifeq ($(CONFIG_SYSTEM_TRUSTED_KEYRING),y)
f0e6d220 126X509_CERTIFICATES-y := $(wildcard *.x509) $(wildcard $(srctree)/*.x509)
d7ec435f
DH
127X509_CERTIFICATES-$(CONFIG_MODULE_SIG) += $(objtree)/signing_key.x509
128X509_CERTIFICATES-raw := $(sort $(foreach CERT,$(X509_CERTIFICATES-y), \
0fbd39cf 129 $(or $(realpath $(CERT)),$(CERT))))
d7ec435f 130X509_CERTIFICATES := $(subst $(realpath $(objtree))/,,$(X509_CERTIFICATES-raw))
f0e6d220
DH
131
132ifeq ($(X509_CERTIFICATES),)
133$(warning *** No X.509 certificates found ***)
134endif
135
136ifneq ($(wildcard $(obj)/.x509.list),)
137ifneq ($(shell cat $(obj)/.x509.list),$(X509_CERTIFICATES))
138$(info X.509 certificate list changed)
139$(shell rm $(obj)/.x509.list)
140endif
141endif
142
b56e5a17 143kernel/system_certificates.o: $(obj)/x509_certificate_list
e10e1774 144
f0e6d220 145quiet_cmd_x509certs = CERTS $@
b56e5a17 146 cmd_x509certs = cat $(X509_CERTIFICATES) /dev/null >$@ $(foreach X509,$(X509_CERTIFICATES),; echo " - Including cert $(X509)")
e10e1774 147
f0e6d220
DH
148targets += $(obj)/x509_certificate_list
149$(obj)/x509_certificate_list: $(X509_CERTIFICATES) $(obj)/.x509.list
150 $(call if_changed,x509certs)
631cc66e 151
f0e6d220
DH
152targets += $(obj)/.x509.list
153$(obj)/.x509.list:
154 @echo $(X509_CERTIFICATES) >$@
f46a3cbb 155endif
d441108c 156
f0e6d220 157clean-files := x509_certificate_list .x509.list
d441108c 158
b56e5a17 159ifeq ($(CONFIG_MODULE_SIG),y)
d441108c
DH
160###############################################################################
161#
162# If module signing is requested, say by allyesconfig, but a key has not been
163# supplied, then one will need to be generated to make sure the build does not
164# fail and that the kernel may be used afterwards.
165#
166###############################################################################
22753674 167ifndef CONFIG_MODULE_SIG_HASH
5e8cb1e4
DH
168$(error Could not determine digest type to use from kernel config)
169endif
170
d441108c
DH
171signing_key.priv signing_key.x509: x509.genkey
172 @echo "###"
173 @echo "### Now generating an X.509 key pair to be used for signing modules."
174 @echo "###"
175 @echo "### If this takes a long time, you might wish to run rngd in the"
176 @echo "### background to keep the supply of entropy topped up. It"
2008713c
PA
177 @echo "### needs to be run as root, and uses a hardware random"
178 @echo "### number generator if one is available."
d441108c 179 @echo "###"
22753674
MM
180 openssl req -new -nodes -utf8 -$(CONFIG_MODULE_SIG_HASH) -days 36500 \
181 -batch -x509 -config x509.genkey \
d441108c 182 -outform DER -out signing_key.x509 \
07c449bb 183 -keyout signing_key.priv 2>&1
d441108c
DH
184 @echo "###"
185 @echo "### Key pair generated."
186 @echo "###"
187
188x509.genkey:
189 @echo Generating X.509 key generation config
190 @echo >x509.genkey "[ req ]"
191 @echo >>x509.genkey "default_bits = 4096"
192 @echo >>x509.genkey "distinguished_name = req_distinguished_name"
193 @echo >>x509.genkey "prompt = no"
e7d113bc 194 @echo >>x509.genkey "string_mask = utf8only"
d441108c
DH
195 @echo >>x509.genkey "x509_extensions = myexts"
196 @echo >>x509.genkey
197 @echo >>x509.genkey "[ req_distinguished_name ]"
198 @echo >>x509.genkey "O = Magrathea"
199 @echo >>x509.genkey "CN = Glacier signing key"
200 @echo >>x509.genkey "emailAddress = slartibartfast@magrathea.h2g2"
201 @echo >>x509.genkey
202 @echo >>x509.genkey "[ myexts ]"
203 @echo >>x509.genkey "basicConstraints=critical,CA:FALSE"
204 @echo >>x509.genkey "keyUsage=digitalSignature"
205 @echo >>x509.genkey "subjectKeyIdentifier=hash"
206 @echo >>x509.genkey "authorityKeyIdentifier=keyid"
207endif