Commit | Line | Data |
---|---|---|
b2441318 | 1 | # SPDX-License-Identifier: GPL-2.0 |
74b469f2 SR |
2 | # Unified Makefile for i386 and x86_64 |
3 | ||
2266cfd5 | 4 | # select defconfig based on actual architecture |
d746d647 | 5 | ifeq ($(ARCH),x86) |
f9bb7f6a | 6 | ifeq ($(shell uname -m | sed -e 's/i.86/i386/'),i386) |
d746d647 | 7 | KBUILD_DEFCONFIG := i386_defconfig |
f9bb7f6a AB |
8 | else |
9 | KBUILD_DEFCONFIG := x86_64_defconfig | |
ffee0de4 | 10 | endif |
d746d647 SR |
11 | else |
12 | KBUILD_DEFCONFIG := $(ARCH)_defconfig | |
13 | endif | |
2266cfd5 | 14 | |
b2f825bf PZ |
15 | ifdef CONFIG_CC_IS_GCC |
16 | RETPOLINE_CFLAGS := $(call cc-option,-mindirect-branch=thunk-extern -mindirect-branch-register) | |
17 | RETPOLINE_VDSO_CFLAGS := $(call cc-option,-mindirect-branch=thunk-inline -mindirect-branch-register) | |
18 | endif | |
19 | ifdef CONFIG_CC_IS_CLANG | |
20 | RETPOLINE_CFLAGS := -mretpoline-external-thunk | |
21 | RETPOLINE_VDSO_CFLAGS := -mretpoline | |
22 | endif | |
27b5de62 | 23 | RETPOLINE_CFLAGS += $(call cc-option,-mindirect-branch-cs-prefix) |
f43b9876 PZ |
24 | |
25 | ifdef CONFIG_RETHUNK | |
26 | RETHUNK_CFLAGS := -mfunction-return=thunk-extern | |
27 | RETPOLINE_CFLAGS += $(RETHUNK_CFLAGS) | |
28 | endif | |
29 | ||
efc72a66 | 30 | export RETHUNK_CFLAGS |
b2f825bf PZ |
31 | export RETPOLINE_CFLAGS |
32 | export RETPOLINE_VDSO_CFLAGS | |
33 | ||
d77698df MK |
34 | # For gcc stack alignment is specified with -mpreferred-stack-boundary, |
35 | # clang has the option -mstack-alignment for that purpose. | |
36 | ifneq ($(call cc-option, -mpreferred-stack-boundary=4),) | |
8f918697 MK |
37 | cc_stack_align4 := -mpreferred-stack-boundary=2 |
38 | cc_stack_align8 := -mpreferred-stack-boundary=3 | |
39 | else ifneq ($(call cc-option, -mstack-alignment=16),) | |
40 | cc_stack_align4 := -mstack-alignment=4 | |
41 | cc_stack_align8 := -mstack-alignment=8 | |
d77698df MK |
42 | endif |
43 | ||
1c678da3 DW |
44 | # How to compile the 16-bit code. Note we always compile for -march=i386; |
45 | # that way we can complain to the user if the CPU is insufficient. | |
156ff4a5 | 46 | REALMODE_CFLAGS := -m16 -g -Os -DDISABLE_BRANCH_PROFILING -D__DISABLE_EXPORTS \ |
1c678da3 | 47 | -Wall -Wstrict-prototypes -march=i386 -mregparm=3 \ |
1c678da3 | 48 | -fno-strict-aliasing -fomit-frame-pointer -fno-pic \ |
9fcb51c1 | 49 | -mno-mmx -mno-sse $(call cc-option,-fcf-protection=none) |
032a2c4f | 50 | |
685969e0 | 51 | REALMODE_CFLAGS += -ffreestanding |
893ab004 | 52 | REALMODE_CFLAGS += -fno-stack-protector |
989ceac7 ND |
53 | REALMODE_CFLAGS += -Wno-address-of-packed-member |
54 | REALMODE_CFLAGS += $(cc_stack_align4) | |
8abe7fc2 | 55 | REALMODE_CFLAGS += $(CLANG_FLAGS) |
1c678da3 DW |
56 | export REALMODE_CFLAGS |
57 | ||
0a6ef376 SR |
58 | # BITS is used as extension for files which are available in a 32 bit |
59 | # and a 64 bit version to simplify shared Makefiles. | |
60 | # e.g.: obj-y += foo_$(BITS).o | |
61 | export BITS | |
74b469f2 | 62 | |
b2c51106 AL |
63 | # |
64 | # Prevent GCC from generating any FP code by mistake. | |
65 | # | |
66 | # This must happen before we try the -mpreferred-stack-boundary, see: | |
67 | # | |
68 | # https://gcc.gnu.org/bugzilla/show_bug.cgi?id=53383 | |
69 | # | |
989ceac7 | 70 | KBUILD_CFLAGS += -mno-sse -mno-mmx -mno-sse2 -mno-3dnow -mno-avx |
09498135 | 71 | KBUILD_RUSTFLAGS += -Ctarget-feature=-sse,-sse2,-sse3,-ssse3,-sse4.1,-sse4.2,-avx,-avx2 |
b2c51106 | 72 | |
156ff4a5 PZ |
73 | ifeq ($(CONFIG_X86_KERNEL_IBT),y) |
74 | # | |
75 | # Kernel IBT has S_CET.NOTRACK_EN=0, as such the compilers must not generate | |
76 | # NOTRACK prefixes. Current generation compilers unconditionally employ NOTRACK | |
77 | # for jump-tables, as such, disable jump-tables for now. | |
78 | # | |
79 | # (jump-tables are implicitly disabled by RETPOLINE) | |
80 | # | |
81 | # https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104816 | |
82 | # | |
83 | KBUILD_CFLAGS += $(call cc-option,-fcf-protection=branch -fno-jump-tables) | |
84 | else | |
256b92af | 85 | KBUILD_CFLAGS += $(call cc-option,-fcf-protection=none) |
156ff4a5 | 86 | endif |
256b92af | 87 | |
d746d647 | 88 | ifeq ($(CONFIG_X86_32),y) |
0a6ef376 | 89 | BITS := 32 |
8c6531f7 | 90 | UTS_MACHINE := i386 |
4ba7e5cd | 91 | CHECKFLAGS += -D__i386__ |
0a6ef376 | 92 | |
989ceac7 ND |
93 | KBUILD_AFLAGS += -m32 |
94 | KBUILD_CFLAGS += -m32 | |
0a6ef376 | 95 | |
0a6ef376 SR |
96 | KBUILD_CFLAGS += -msoft-float -mregparm=3 -freg-struct-return |
97 | ||
484d90ee AB |
98 | # Never want PIC in a 32-bit kernel, prevent breakage with GCC built |
99 | # with nonstandard options | |
100 | KBUILD_CFLAGS += -fno-pic | |
101 | ||
d77698df MK |
102 | # Align the stack to the register width instead of using the default |
103 | # alignment of 16 bytes. This reduces stack usage and the number of | |
104 | # alignment instructions. | |
989ceac7 | 105 | KBUILD_CFLAGS += $(cc_stack_align4) |
0a6ef376 | 106 | |
0a6ef376 | 107 | # CPU-specific tuning. Anything which can be shared with UML should go here. |
d8285639 | 108 | include $(srctree)/arch/x86/Makefile_32.cpu |
0a6ef376 SR |
109 | KBUILD_CFLAGS += $(cflags-y) |
110 | ||
111 | # temporary until string.h is fixed | |
112 | KBUILD_CFLAGS += -ffreestanding | |
3fb0fdb3 AL |
113 | |
114 | ifeq ($(CONFIG_STACKPROTECTOR),y) | |
115 | ifeq ($(CONFIG_SMP),y) | |
116 | KBUILD_CFLAGS += -mstack-protector-guard-reg=fs -mstack-protector-guard-symbol=__stack_chk_guard | |
117 | else | |
118 | KBUILD_CFLAGS += -mstack-protector-guard=global | |
119 | endif | |
120 | endif | |
74b469f2 | 121 | else |
0a6ef376 | 122 | BITS := 64 |
8c6531f7 | 123 | UTS_MACHINE := x86_64 |
1f2f01b1 | 124 | CHECKFLAGS += -D__x86_64__ |
0a6ef376 SR |
125 | |
126 | KBUILD_AFLAGS += -m64 | |
127 | KBUILD_CFLAGS += -m64 | |
128 | ||
be6cb027 | 129 | # Align jump targets to 1 byte, not the default 16 bytes: |
2c4fd1ac | 130 | KBUILD_CFLAGS += $(call cc-option,-falign-jumps=1) |
be6cb027 | 131 | |
52648e83 | 132 | # Pack loops tightly as well: |
2c4fd1ac | 133 | KBUILD_CFLAGS += $(call cc-option,-falign-loops=1) |
52648e83 | 134 | |
5c630089 | 135 | # Don't autogenerate traditional x87 instructions |
989ceac7 | 136 | KBUILD_CFLAGS += -mno-80387 |
8f2dd677 | 137 | KBUILD_CFLAGS += $(call cc-option,-mno-fp-ret-in-387) |
5551a34e | 138 | |
d77698df MK |
139 | # By default gcc and clang use a stack alignment of 16 bytes for x86. |
140 | # However the standard kernel entry on x86-64 leaves the stack on an | |
141 | # 8-byte boundary. If the compiler isn't informed about the actual | |
142 | # alignment it will generate extra alignment instructions for the | |
143 | # default alignment which keep the stack *mis*aligned. | |
144 | # Furthermore an alignment to the register width reduces stack usage | |
145 | # and the number of alignment instructions. | |
989ceac7 | 146 | KBUILD_CFLAGS += $(cc_stack_align8) |
d9b0cde9 | 147 | |
d9ee948d L |
148 | # Use -mskip-rax-setup if supported. |
149 | KBUILD_CFLAGS += $(call cc-option,-mskip-rax-setup) | |
150 | ||
0a6ef376 | 151 | # FIXME - should be integrated in Makefile.cpu (Makefile_32.cpu) |
989ceac7 ND |
152 | cflags-$(CONFIG_MK8) += -march=k8 |
153 | cflags-$(CONFIG_MPSC) += -march=nocona | |
154 | cflags-$(CONFIG_MCORE2) += -march=core2 | |
155 | cflags-$(CONFIG_MATOM) += -march=atom | |
156 | cflags-$(CONFIG_GENERIC_CPU) += -mtune=generic | |
0a6ef376 SR |
157 | KBUILD_CFLAGS += $(cflags-y) |
158 | ||
09498135 MO |
159 | rustflags-$(CONFIG_MK8) += -Ctarget-cpu=k8 |
160 | rustflags-$(CONFIG_MPSC) += -Ctarget-cpu=nocona | |
161 | rustflags-$(CONFIG_MCORE2) += -Ctarget-cpu=core2 | |
162 | rustflags-$(CONFIG_MATOM) += -Ctarget-cpu=atom | |
163 | rustflags-$(CONFIG_GENERIC_CPU) += -Ztune-cpu=generic | |
164 | KBUILD_RUSTFLAGS += $(rustflags-y) | |
165 | ||
0a6ef376 SR |
166 | KBUILD_CFLAGS += -mno-red-zone |
167 | KBUILD_CFLAGS += -mcmodel=kernel | |
09498135 MO |
168 | KBUILD_RUSTFLAGS += -Cno-redzone=y |
169 | KBUILD_RUSTFLAGS += -Ccode-model=kernel | |
5d707e9c | 170 | endif |
0a6ef376 | 171 | |
3f135e57 JP |
172 | # |
173 | # If the function graph tracer is used with mcount instead of fentry, | |
174 | # '-maccumulate-outgoing-args' is needed to prevent a GCC bug | |
175 | # (https://gcc.gnu.org/bugzilla/show_bug.cgi?id=42109) | |
176 | # | |
177 | ifdef CONFIG_FUNCTION_GRAPH_TRACER | |
178 | ifndef CONFIG_HAVE_FENTRY | |
179 | ACCUMULATE_OUTGOING_ARGS := 1 | |
3f135e57 JP |
180 | endif |
181 | endif | |
182 | ||
3f135e57 | 183 | ifeq ($(ACCUMULATE_OUTGOING_ARGS), 1) |
4a1bec46 ND |
184 | # This compiler flag is not supported by Clang: |
185 | KBUILD_CFLAGS += $(call cc-option,-maccumulate-outgoing-args,) | |
3f135e57 JP |
186 | endif |
187 | ||
25dfeeb7 SR |
188 | # Workaround for a gcc prelease that unfortunately was shipped in a suse release |
189 | KBUILD_CFLAGS += -Wno-sign-compare | |
190 | # | |
191 | KBUILD_CFLAGS += -fno-asynchronous-unwind-tables | |
0a6ef376 | 192 | |
76b04384 DW |
193 | # Avoid indirect branches in kernel to deal with Spectre |
194 | ifdef CONFIG_RETPOLINE | |
4cd24de3 | 195 | KBUILD_CFLAGS += $(RETPOLINE_CFLAGS) |
ce02ef06 DB |
196 | # Additionally, avoid generating expensive indirect jumps which |
197 | # are subject to retpolines for small number of switch cases. | |
198 | # clang turns off jump table generation by default when under | |
a9d57ef1 DB |
199 | # retpoline builds, however, gcc does not for x86. This has |
200 | # only been fixed starting from gcc stable version 8.4.0 and | |
201 | # onwards, but not for older ones. See gcc bug #86952. | |
202 | ifndef CONFIG_CC_IS_CLANG | |
989ceac7 | 203 | KBUILD_CFLAGS += -fno-jump-tables |
a9d57ef1 | 204 | endif |
76b04384 DW |
205 | endif |
206 | ||
e463a09a PZ |
207 | ifdef CONFIG_SLS |
208 | KBUILD_CFLAGS += -mharden-sls=all | |
209 | endif | |
210 | ||
931ab636 | 211 | ifdef CONFIG_CALL_PADDING |
bea75b33 TG |
212 | PADDING_CFLAGS := -fpatchable-function-entry=$(CONFIG_FUNCTION_PADDING_BYTES),$(CONFIG_FUNCTION_PADDING_BYTES) |
213 | KBUILD_CFLAGS += $(PADDING_CFLAGS) | |
214 | export PADDING_CFLAGS | |
215 | endif | |
216 | ||
0024430e NC |
217 | KBUILD_LDFLAGS += -m elf_$(UTS_MACHINE) |
218 | ||
219 | ifdef CONFIG_LTO_CLANG | |
fccb3d3e | 220 | ifeq ($(call test-lt, $(CONFIG_LLD_VERSION), 130000),y) |
2398ce80 TV |
221 | KBUILD_LDFLAGS += -plugin-opt=-stack-alignment=$(if $(CONFIG_X86_32),4,8) |
222 | endif | |
0024430e | 223 | endif |
587af649 AS |
224 | |
225 | ifdef CONFIG_X86_NEED_RELOCS | |
226 | LDFLAGS_vmlinux := --emit-relocs --discard-none | |
227 | else | |
228 | LDFLAGS_vmlinux := | |
229 | endif | |
230 | ||
231 | # | |
232 | # The 64-bit kernel must be aligned to 2MB. Pass -z max-page-size=0x200000 to | |
233 | # the linker to force 2MB page size regardless of the default page size used | |
234 | # by the linker. | |
235 | # | |
236 | ifdef CONFIG_X86_64 | |
237 | LDFLAGS_vmlinux += -z max-page-size=0x200000 | |
238 | endif | |
239 | ||
83109d5d | 240 | |
3ce9e53e | 241 | archscripts: scripts_basic |
6520fe55 PA |
242 | $(Q)$(MAKE) $(build)=arch/x86/tools relocs |
243 | ||
303395ac PA |
244 | ### |
245 | # Syscall table generation | |
246 | ||
247 | archheaders: | |
1f57d5d8 | 248 | $(Q)$(MAKE) $(build)=arch/x86/entry/syscalls all |
303395ac | 249 | |
0a6ef376 SR |
250 | ### |
251 | # Kernel objects | |
252 | ||
0a6ef376 SR |
253 | libs-y += arch/x86/lib/ |
254 | ||
0a6ef376 SR |
255 | # drivers-y are linked after core-y |
256 | drivers-$(CONFIG_MATH_EMULATION) += arch/x86/math-emu/ | |
257 | drivers-$(CONFIG_PCI) += arch/x86/pci/ | |
258 | ||
cf7700fe | 259 | # suspend and hibernation support |
0a6ef376 | 260 | drivers-$(CONFIG_PM) += arch/x86/power/ |
cf7700fe | 261 | |
0a6ef376 | 262 | drivers-$(CONFIG_FB) += arch/x86/video/ |
0a6ef376 SR |
263 | |
264 | #### | |
265 | # boot loader support. Several targets are kept for legacy purposes | |
266 | ||
267 | boot := arch/x86/boot | |
268 | ||
f279b49f | 269 | BOOT_TARGETS = bzdisk fdimage fdimage144 fdimage288 hdimage isoimage |
f9c5107c PA |
270 | |
271 | PHONY += bzImage $(BOOT_TARGETS) | |
0a6ef376 SR |
272 | |
273 | # Default kernel to build | |
274 | all: bzImage | |
275 | ||
276 | # KBUILD_IMAGE specify target image being built | |
f9c5107c | 277 | KBUILD_IMAGE := $(boot)/bzImage |
0a6ef376 | 278 | |
f9c5107c | 279 | bzImage: vmlinux |
ca0e9bad MH |
280 | ifeq ($(CONFIG_X86_DECODER_SELFTEST),y) |
281 | $(Q)$(MAKE) $(build)=arch/x86/tools posttest | |
282 | endif | |
0a6ef376 SR |
283 | $(Q)$(MAKE) $(build)=$(boot) $(KBUILD_IMAGE) |
284 | $(Q)mkdir -p $(objtree)/arch/$(UTS_MACHINE)/boot | |
41b3eae6 | 285 | $(Q)ln -fsn ../../x86/boot/bzImage $(objtree)/arch/$(UTS_MACHINE)/boot/$@ |
0a6ef376 | 286 | |
f9c5107c PA |
287 | $(BOOT_TARGETS): vmlinux |
288 | $(Q)$(MAKE) $(build)=$(boot) $@ | |
0a6ef376 | 289 | |
6d61b8e6 MY |
290 | PHONY += install |
291 | install: | |
f774f5bb | 292 | $(call cmd,install) |
1648e4f8 | 293 | |
0a6ef376 SR |
294 | PHONY += vdso_install |
295 | vdso_install: | |
d603c8e1 | 296 | $(Q)$(MAKE) $(build)=arch/x86/entry/vdso $@ |
0a6ef376 | 297 | |
829fe4aa BH |
298 | archprepare: checkbin |
299 | checkbin: | |
25896d07 MY |
300 | ifdef CONFIG_RETPOLINE |
301 | ifeq ($(RETPOLINE_CFLAGS),) | |
302 | @echo "You are building kernel with non-retpoline compiler." >&2 | |
303 | @echo "Please update your compiler." >&2 | |
304 | @false | |
305 | endif | |
306 | endif | |
829fe4aa | 307 | |
b9f174c8 OS |
308 | ifdef CONFIG_UNWINDER_ORC |
309 | orc_hash_h := arch/$(SRCARCH)/include/generated/asm/orc_hash.h | |
310 | orc_hash_sh := $(srctree)/scripts/orc_hash.sh | |
311 | targets += $(orc_hash_h) | |
312 | quiet_cmd_orc_hash = GEN $@ | |
313 | cmd_orc_hash = mkdir -p $(dir $@); \ | |
314 | $(CONFIG_SHELL) $(orc_hash_sh) < $< > $@ | |
315 | $(orc_hash_h): $(srctree)/arch/x86/include/asm/orc_types.h $(orc_hash_sh) FORCE | |
316 | $(call if_changed,orc_hash) | |
317 | archprepare: $(orc_hash_h) | |
318 | endif | |
319 | ||
0a6ef376 SR |
320 | archclean: |
321 | $(Q)rm -rf $(objtree)/arch/i386 | |
322 | $(Q)rm -rf $(objtree)/arch/x86_64 | |
0a6ef376 SR |
323 | |
324 | define archhelp | |
ac5d0887 BP |
325 | echo '* bzImage - Compressed kernel image (arch/x86/boot/bzImage)' |
326 | echo ' install - Install kernel using (your) ~/bin/$(INSTALLKERNEL) or' | |
327 | echo ' (distribution) /sbin/$(INSTALLKERNEL) or install to ' | |
328 | echo ' $$(INSTALL_PATH) and run lilo' | |
329 | echo '' | |
330 | echo ' fdimage - Create 1.4MB boot floppy image (arch/x86/boot/fdimage)' | |
331 | echo ' fdimage144 - Create 1.4MB boot floppy image (arch/x86/boot/fdimage)' | |
332 | echo ' fdimage288 - Create 2.8MB boot floppy image (arch/x86/boot/fdimage)' | |
f279b49f | 333 | echo ' hdimage - Create a BIOS/EFI hard disk image (arch/x86/boot/hdimage)' |
ac5d0887 | 334 | echo ' isoimage - Create a boot CD-ROM image (arch/x86/boot/image.iso)' |
f279b49f | 335 | echo ' bzdisk/fdimage*/hdimage/isoimage also accept:' |
ac5d0887 | 336 | echo ' FDARGS="..." arguments for the booted kernel' |
a757ac55 | 337 | echo ' FDINITRD=file initrd for the booted kernel' |
ac5d0887 BP |
338 | echo '' |
339 | echo ' kvm_guest.config - Enable Kconfig items for running this kernel as a KVM guest' | |
340 | echo ' xen.config - Enable Kconfig items for running this kernel as a Xen guest' | |
9b5a7f4a | 341 | echo ' x86_debug.config - Enable tip tree debugging options for testing' |
fbaf0aa8 | 342 | |
0a6ef376 | 343 | endef |