forked from torvalds/linux
-
Notifications
You must be signed in to change notification settings - Fork 16
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
fortify: refactor test_fortify Makefile to fix some build problems
There are some issues in the test_fortify Makefile code. Problem 1: cc-disable-warning invokes compiler dozens of times To see how many times the cc-disable-warning is evaluated, change this code: $(call cc-disable-warning,fortify-source) to: $(call cc-disable-warning,$(shell touch /tmp/fortify-$$$$)fortify-source) Then, build the kernel with CONFIG_FORTIFY_SOURCE=y. You will see a large number of '/tmp/fortify-<PID>' files created: $ ls -1 /tmp/fortify-* | wc 80 80 1600 This means the compiler was invoked 80 times just for checking the -Wno-fortify-source flag support. $(call cc-disable-warning,fortify-source) should be added to a simple variable instead of a recursive variable. Problem 2: do not recompile string.o when the test code is updated The test cases are independent of the kernel. However, when the test code is updated, $(obj)/string.o is rebuilt and vmlinux is relinked due to this dependency: $(obj)/string.o: $(obj)/$(TEST_FORTIFY_LOG) always-y is suitable for building the log files. Problem 3: redundant code clean-files += $(addsuffix .o, $(TEST_FORTIFY_LOGS)) ... is unneeded because the top Makefile globally cleans *.o files. This commit fixes these issues and makes the code readable. Signed-off-by: Masahiro Yamada <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Kees Cook <[email protected]>
- Loading branch information
Showing
5 changed files
with
33 additions
and
39 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -5,5 +5,3 @@ | |
/gen_crc32table | ||
/gen_crc64table | ||
/oid_registry_data.c | ||
/test_fortify.log | ||
/test_fortify/*.log |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,2 @@ | ||
# SPDX-License-Identifier: GPL-2.0-only | ||
/*.log |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,28 @@ | ||
# SPDX-License-Identifier: GPL-2.0 | ||
|
||
ccflags-y := $(call cc-disable-warning,fortify-source) | ||
|
||
quiet_cmd_test_fortify = TEST $@ | ||
cmd_test_fortify = $(CONFIG_SHELL) $(srctree)/scripts/test_fortify.sh \ | ||
$< $@ "$(NM)" $(CC) $(c_flags) -DKBUILD_EXTRA_WARN1 | ||
|
||
$(obj)/%.log: $(src)/%.c $(srctree)/scripts/test_fortify.sh \ | ||
$(src)/test_fortify.h \ | ||
$(srctree)/include/linux/fortify-string.h \ | ||
FORCE | ||
$(call if_changed,test_fortify) | ||
|
||
logs = $(patsubst $(src)/%.c, %.log, $(wildcard $(src)/*-*.c)) | ||
targets += $(logs) | ||
|
||
quiet_cmd_gen_fortify_log = CAT $@ | ||
cmd_gen_fortify_log = cat $(or $(real-prereqs),/dev/null) > $@ | ||
|
||
$(obj)/test_fortify.log: $(addprefix $(obj)/, $(logs)) FORCE | ||
$(call if_changed,gen_fortify_log) | ||
|
||
always-y += test_fortify.log | ||
|
||
# Some architectures define __NO_FORTIFY if __SANITIZE_ADDRESS__ is undefined. | ||
# Pass CFLAGS_KASAN to avoid warnings. | ||
KASAN_SANITIZE := y |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters