]> git.baikalelectronics.ru Git - kernel.git/commit
efi/x86: Disable instrumentation in the EFI runtime handling code
authorArd Biesheuvel <ardb@kernel.org>
Tue, 21 Jan 2020 09:39:12 +0000 (10:39 +0100)
committerIngo Molnar <mingo@kernel.org>
Sat, 25 Jan 2020 09:14:37 +0000 (10:14 +0100)
commit5c96ecbfbcf7aaa8685a9f6f7ffde82de09b74cd
treedc6102d57008c1b047c3255a0c41e41d86f47267
parentb6bb572ec322925cebe8f4c49e0881c609bc84d7
efi/x86: Disable instrumentation in the EFI runtime handling code

We already disable KASAN instrumentation specifically for the
EFI routines that are known to dereference memory addresses that
KASAN does not know about, avoiding false positive KASAN splats.

However, as it turns out, having GCOV or KASAN instrumentation enabled
interferes with the compiler's ability to optimize away function calls
that are guarded by IS_ENABLED() checks that should have resulted in
those references to have been const-propagated out of existence. But
with instrumenation enabled, we may get build errors like:

   ld: arch/x86/platform/efi/efi_64.o: in function `efi_thunk_set_virtual_address_map':
   ld: arch/x86/platform/efi/efi_64.o: in function `efi_set_virtual_address_map':

in builds where CONFIG_EFI=y but CONFIG_EFI_MIXED or CONFIG_X86_UV are not
defined, even though the invocations are conditional on IS_ENABLED() checks
against the respective Kconfig symbols.

So let's disable instrumentation entirely for this subdirectory, which
isn't that useful here to begin with.

Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Cc: linux-efi@vger.kernel.org
arch/x86/platform/efi/Makefile