• Ard Biesheuvel's avatar
    efi/x86: Disable instrumentation in the EFI runtime handling code · ac6119e7
    Ard Biesheuvel authored
    We already disable KASAN instrumentation specifically for the
    EFI routines that are known to dereference memory addresses that
    KASAN does not know about, avoiding false positive KASAN splats.
    
    However, as it turns out, having GCOV or KASAN instrumentation enabled
    interferes with the compiler's ability to optimize away function calls
    that are guarded by IS_ENABLED() checks that should have resulted in
    those references to have been const-propagated out of existence. But
    with instrumenation enabled, we may get build errors like:
    
       ld: arch/x86/platform/efi/efi_64.o: in function `efi_thunk_set_virtual_address_map':
       ld: arch/x86/platform/efi/efi_64.o: in function `efi_set_virtual_address_map':
    
    in builds where CONFIG_EFI=y but CONFIG_EFI_MIXED or CONFIG_X86_UV are not
    defined, even though the invocations are conditional on IS_ENABLED() checks
    against the respective Kconfig symbols.
    
    So let's disable instrumentation entirely for this subdirectory, which
    isn't that useful here to begin with.
    Signed-off-by: default avatarArd Biesheuvel <ardb@kernel.org>
    Signed-off-by: default avatarIngo Molnar <mingo@kernel.org>
    Cc: linux-efi@vger.kernel.org
    ac6119e7
Makefile 244 Bytes