Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 1 | # SPDX-License-Identifier: GPL-2.0 |
| 2 | |
| 3 | gcc-plugin-$(CONFIG_GCC_PLUGIN_CYC_COMPLEXITY) += cyc_complexity_plugin.so |
| 4 | |
| 5 | gcc-plugin-$(CONFIG_GCC_PLUGIN_LATENT_ENTROPY) += latent_entropy_plugin.so |
| 6 | gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_LATENT_ENTROPY) \ |
| 7 | += -DLATENT_ENTROPY_PLUGIN |
| 8 | ifdef CONFIG_GCC_PLUGIN_LATENT_ENTROPY |
Olivier Deprez | 92d4c21 | 2022-12-06 15:05:30 +0100 | [diff] [blame^] | 9 | DISABLE_LATENT_ENTROPY_PLUGIN += -fplugin-arg-latent_entropy_plugin-disable -ULATENT_ENTROPY_PLUGIN |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 10 | endif |
| 11 | export DISABLE_LATENT_ENTROPY_PLUGIN |
| 12 | |
| 13 | gcc-plugin-$(CONFIG_GCC_PLUGIN_SANCOV) += sancov_plugin.so |
| 14 | |
| 15 | gcc-plugin-$(CONFIG_GCC_PLUGIN_STRUCTLEAK) += structleak_plugin.so |
| 16 | gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_STRUCTLEAK_VERBOSE) \ |
| 17 | += -fplugin-arg-structleak_plugin-verbose |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 18 | gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF) \ |
| 19 | += -fplugin-arg-structleak_plugin-byref |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 20 | gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF_ALL) \ |
| 21 | += -fplugin-arg-structleak_plugin-byref-all |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame] | 22 | ifdef CONFIG_GCC_PLUGIN_STRUCTLEAK |
| 23 | DISABLE_STRUCTLEAK_PLUGIN += -fplugin-arg-structleak_plugin-disable |
| 24 | endif |
| 25 | export DISABLE_STRUCTLEAK_PLUGIN |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 26 | gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_STRUCTLEAK) \ |
| 27 | += -DSTRUCTLEAK_PLUGIN |
| 28 | |
| 29 | gcc-plugin-$(CONFIG_GCC_PLUGIN_RANDSTRUCT) += randomize_layout_plugin.so |
| 30 | gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_RANDSTRUCT) \ |
| 31 | += -DRANDSTRUCT_PLUGIN |
| 32 | gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_RANDSTRUCT_PERFORMANCE) \ |
| 33 | += -fplugin-arg-randomize_layout_plugin-performance-mode |
| 34 | |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 35 | gcc-plugin-$(CONFIG_GCC_PLUGIN_STACKLEAK) += stackleak_plugin.so |
| 36 | gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_STACKLEAK) \ |
| 37 | += -DSTACKLEAK_PLUGIN |
| 38 | gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_STACKLEAK) \ |
| 39 | += -fplugin-arg-stackleak_plugin-track-min-size=$(CONFIG_STACKLEAK_TRACK_MIN_SIZE) |
Olivier Deprez | 157378f | 2022-04-04 15:47:50 +0200 | [diff] [blame] | 40 | gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_STACKLEAK) \ |
| 41 | += -fplugin-arg-stackleak_plugin-arch=$(SRCARCH) |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame] | 42 | ifdef CONFIG_GCC_PLUGIN_STACKLEAK |
| 43 | DISABLE_STACKLEAK_PLUGIN += -fplugin-arg-stackleak_plugin-disable |
| 44 | endif |
| 45 | export DISABLE_STACKLEAK_PLUGIN |
| 46 | |
| 47 | gcc-plugin-$(CONFIG_GCC_PLUGIN_ARM_SSP_PER_TASK) += arm_ssp_per_task_plugin.so |
| 48 | ifdef CONFIG_GCC_PLUGIN_ARM_SSP_PER_TASK |
| 49 | DISABLE_ARM_SSP_PER_TASK_PLUGIN += -fplugin-arg-arm_ssp_per_task_plugin-disable |
| 50 | endif |
| 51 | export DISABLE_ARM_SSP_PER_TASK_PLUGIN |
| 52 | |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 53 | # All the plugin CFLAGS are collected here in case a build target needs to |
| 54 | # filter them out of the KBUILD_CFLAGS. |
| 55 | GCC_PLUGINS_CFLAGS := $(strip $(addprefix -fplugin=$(objtree)/scripts/gcc-plugins/, $(gcc-plugin-y)) $(gcc-plugin-cflags-y)) |
| 56 | # The sancov_plugin.so is included via CFLAGS_KCOV, so it is removed here. |
| 57 | GCC_PLUGINS_CFLAGS := $(filter-out %/sancov_plugin.so, $(GCC_PLUGINS_CFLAGS)) |
| 58 | export GCC_PLUGINS_CFLAGS |
| 59 | |
| 60 | # Add the flags to the build! |
| 61 | KBUILD_CFLAGS += $(GCC_PLUGINS_CFLAGS) |
| 62 | |
| 63 | # All enabled GCC plugins are collected here for building below. |
| 64 | GCC_PLUGIN := $(gcc-plugin-y) |
| 65 | export GCC_PLUGIN |