mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-11-24 01:30:55 +07:00
treewide: remove DISABLE_LTO
This change removes all instances of DISABLE_LTO from Makefiles, as they are currently unused, and the preferred method of disabling LTO is to filter out the flags instead. Note added by Masahiro Yamada: DISABLE_LTO was added as preparation for GCC LTO, but GCC LTO was not pulled into the mainline. (https://lkml.org/lkml/2014/4/8/272) Suggested-by: Kees Cook <keescook@chromium.org> Signed-off-by: Sami Tolvanen <samitolvanen@google.com> Reviewed-by: Kees Cook <keescook@chromium.org> Signed-off-by: Masahiro Yamada <masahiroy@kernel.org>
This commit is contained in:
parent
0fa21cf448
commit
0f6372e522
@ -31,7 +31,6 @@ ccflags-y := -fno-common -fno-builtin -fno-stack-protector -ffixed-x18
|
|||||||
ccflags-y += -DDISABLE_BRANCH_PROFILING
|
ccflags-y += -DDISABLE_BRANCH_PROFILING
|
||||||
|
|
||||||
CFLAGS_REMOVE_vgettimeofday.o = $(CC_FLAGS_FTRACE) -Os $(CC_FLAGS_SCS) $(GCC_PLUGINS_CFLAGS)
|
CFLAGS_REMOVE_vgettimeofday.o = $(CC_FLAGS_FTRACE) -Os $(CC_FLAGS_SCS) $(GCC_PLUGINS_CFLAGS)
|
||||||
KBUILD_CFLAGS += $(DISABLE_LTO)
|
|
||||||
KASAN_SANITIZE := n
|
KASAN_SANITIZE := n
|
||||||
UBSAN_SANITIZE := n
|
UBSAN_SANITIZE := n
|
||||||
OBJECT_FILES_NON_STANDARD := y
|
OBJECT_FILES_NON_STANDARD := y
|
||||||
|
@ -3,8 +3,6 @@
|
|||||||
# Building vDSO images for sparc.
|
# Building vDSO images for sparc.
|
||||||
#
|
#
|
||||||
|
|
||||||
KBUILD_CFLAGS += $(DISABLE_LTO)
|
|
||||||
|
|
||||||
VDSO64-$(CONFIG_SPARC64) := y
|
VDSO64-$(CONFIG_SPARC64) := y
|
||||||
VDSOCOMPAT-$(CONFIG_COMPAT) := y
|
VDSOCOMPAT-$(CONFIG_COMPAT) := y
|
||||||
|
|
||||||
|
@ -9,8 +9,6 @@ ARCH_REL_TYPE_ABS := R_X86_64_JUMP_SLOT|R_X86_64_GLOB_DAT|R_X86_64_RELATIVE|
|
|||||||
ARCH_REL_TYPE_ABS += R_386_GLOB_DAT|R_386_JMP_SLOT|R_386_RELATIVE
|
ARCH_REL_TYPE_ABS += R_386_GLOB_DAT|R_386_JMP_SLOT|R_386_RELATIVE
|
||||||
include $(srctree)/lib/vdso/Makefile
|
include $(srctree)/lib/vdso/Makefile
|
||||||
|
|
||||||
KBUILD_CFLAGS += $(DISABLE_LTO)
|
|
||||||
|
|
||||||
# Sanitizer runtimes are unavailable and cannot be linked here.
|
# Sanitizer runtimes are unavailable and cannot be linked here.
|
||||||
KASAN_SANITIZE := n
|
KASAN_SANITIZE := n
|
||||||
UBSAN_SANITIZE := n
|
UBSAN_SANITIZE := n
|
||||||
|
@ -38,9 +38,6 @@ KASAN_SANITIZE_kcov.o := n
|
|||||||
KCSAN_SANITIZE_kcov.o := n
|
KCSAN_SANITIZE_kcov.o := n
|
||||||
CFLAGS_kcov.o := $(call cc-option, -fno-conserve-stack) -fno-stack-protector
|
CFLAGS_kcov.o := $(call cc-option, -fno-conserve-stack) -fno-stack-protector
|
||||||
|
|
||||||
# cond_syscall is currently not LTO compatible
|
|
||||||
CFLAGS_sys_ni.o = $(DISABLE_LTO)
|
|
||||||
|
|
||||||
obj-y += sched/
|
obj-y += sched/
|
||||||
obj-y += locking/
|
obj-y += locking/
|
||||||
obj-y += power/
|
obj-y += power/
|
||||||
|
@ -111,7 +111,7 @@ endif
|
|||||||
# ---------------------------------------------------------------------------
|
# ---------------------------------------------------------------------------
|
||||||
|
|
||||||
quiet_cmd_cc_s_c = CC $(quiet_modtag) $@
|
quiet_cmd_cc_s_c = CC $(quiet_modtag) $@
|
||||||
cmd_cc_s_c = $(CC) $(filter-out $(DEBUG_CFLAGS), $(c_flags)) $(DISABLE_LTO) -fverbose-asm -S -o $@ $<
|
cmd_cc_s_c = $(CC) $(filter-out $(DEBUG_CFLAGS), $(c_flags)) -fverbose-asm -S -o $@ $<
|
||||||
|
|
||||||
$(obj)/%.s: $(src)/%.c FORCE
|
$(obj)/%.s: $(src)/%.c FORCE
|
||||||
$(call if_changed_dep,cc_s_c)
|
$(call if_changed_dep,cc_s_c)
|
||||||
|
Loading…
Reference in New Issue
Block a user