1b2441318SGreg Kroah-Hartman# SPDX-License-Identifier: GPL-2.0 21cd9c22fSKirill A. Shutemov# Kernel does not boot with instrumentation of tlb.c and mem_encrypt*.c 35c9a8750SDmitry VyukovKCOV_INSTRUMENT_tlb.o := n 420f07a04SKirill A. ShutemovKCOV_INSTRUMENT_mem_encrypt.o := n 5dbca5e1aSKuppuswamy SathyanarayananKCOV_INSTRUMENT_mem_encrypt_amd.o := n 6818c4fdaSNaohiro AotaKCOV_INSTRUMENT_pgprot.o := n 767bb8e99STom Lendacky 820f07a04SKirill A. ShutemovKASAN_SANITIZE_mem_encrypt.o := n 9dbca5e1aSKuppuswamy SathyanarayananKASAN_SANITIZE_mem_encrypt_amd.o := n 10818c4fdaSNaohiro AotaKASAN_SANITIZE_pgprot.o := n 1167bb8e99STom Lendacky 1240d04110SMarco Elver# Disable KCSAN entirely, because otherwise we get warnings that some functions 1340d04110SMarco Elver# reference __initdata sections. 1440d04110SMarco ElverKCSAN_SANITIZE := n 1593324e68SAlexander Potapenko# Avoid recursion by not calling KMSAN hooks for CEA code. 1693324e68SAlexander PotapenkoKMSAN_SANITIZE_cpu_entry_area.o := n 1740d04110SMarco Elver 1867bb8e99STom Lendackyifdef CONFIG_FUNCTION_TRACER 1920f07a04SKirill A. ShutemovCFLAGS_REMOVE_mem_encrypt.o = -pg 20dbca5e1aSKuppuswamy SathyanarayananCFLAGS_REMOVE_mem_encrypt_amd.o = -pg 21818c4fdaSNaohiro AotaCFLAGS_REMOVE_pgprot.o = -pg 2267bb8e99STom Lendackyendif 235c9a8750SDmitry Vyukov 24f9b57cf8SIngo Molnarobj-y := init.o init_$(BITS).o fault.o ioremap.o extable.o mmap.o \ 2598931dd9SLinus Torvalds pgtable.o physaddr.o tlb.o cpu_entry_area.o maccess.o pgprot.o 26f9b57cf8SIngo Molnar 27f9b57cf8SIngo Molnarobj-y += pat/ 282596e0faSH. Peter Anvin 29577eebeaSJeremy Fitzhardinge# Make sure __phys_addr has no stackprotector 30893ab004SMasahiro YamadaCFLAGS_physaddr.o := -fno-stack-protector 31577eebeaSJeremy Fitzhardinge 32fd940934SKeith Packardobj-$(CONFIG_X86_32) += pgtable_32.o iomap_32.o 332596e0faSH. Peter Anvin 342596e0faSH. Peter Anvinobj-$(CONFIG_HUGETLB_PAGE) += hugetlbpage.o 35f9aad622SAnshuman Khandualobj-$(CONFIG_PTDUMP) += dump_pagetables.o 362ae27137SSteven Priceobj-$(CONFIG_PTDUMP_DEBUGFS) += debug_pagetables.o 372596e0faSH. Peter Anvin 38ef7f0d6aSAndrey RyabininKASAN_SANITIZE_kasan_init_$(BITS).o := n 39ef7f0d6aSAndrey Ryabininobj-$(CONFIG_KASAN) += kasan_init_$(BITS).o 40ef7f0d6aSAndrey Ryabinin 41ce732a75SAlexander PotapenkoKMSAN_SANITIZE_kmsan_shadow.o := n 42ce732a75SAlexander Potapenkoobj-$(CONFIG_KMSAN) += kmsan_shadow.o 43ce732a75SAlexander Potapenko 44ff3a3e9bSPekka Paalanenobj-$(CONFIG_MMIOTRACE) += mmiotrace.o 45fd3fdf11SPekka Paalanenmmiotrace-y := kmmio.o pf_in.o mmio-mod.o 46ff3a3e9bSPekka Paalanenobj-$(CONFIG_MMIOTRACE_TEST) += testmmiotrace.o 47ff3a3e9bSPekka Paalanen 48*35c3151aSMike Rapoport (Microsoft)obj-$(CONFIG_NUMA) += numa.o 49c6f58878STejun Heoobj-$(CONFIG_AMD_NUMA) += amdtopology.o 505acd91abSTejun Heoobj-$(CONFIG_ACPI_NUMA) += srat.o 516247943dSYinghai Lu 5262b5f7d0SDave Hansenobj-$(CONFIG_X86_INTEL_MEMORY_PROTECTION_KEYS) += pkeys.o 530483e1faSThomas Garnierobj-$(CONFIG_RANDOMIZE_MEMORY) += kaslr.o 54ea4654e0SBreno Leitaoobj-$(CONFIG_MITIGATION_PAGE_TABLE_ISOLATION) += pti.o 5562b5f7d0SDave Hansen 5620f07a04SKirill A. Shutemovobj-$(CONFIG_X86_MEM_ENCRYPT) += mem_encrypt.o 57dbca5e1aSKuppuswamy Sathyanarayananobj-$(CONFIG_AMD_MEM_ENCRYPT) += mem_encrypt_amd.o 5820f07a04SKirill A. Shutemov 596ebcb060STom Lendackyobj-$(CONFIG_AMD_MEM_ENCRYPT) += mem_encrypt_boot.o 60