Since many compilers cannot disable KCOV with a function attribute, help it to NOP out any __sanitizer_cov_*() calls injected in noinstr code. This turns: 12: e8 00 00 00 00 callq 17 <lockdep_hardirqs_on+0x17> 13: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4 into: 12: 0f 1f 44 00 00 nopl 0x0(%rax,%rax,1) 13: R_X86_64_NONE __sanitizer_cov_trace_pc-0x4 Just like recordmcount does. Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org> Acked-by: Dmitry Vyukov <dvyukov@google.com>
6 lines
114 B
C
6 lines
114 B
C
#ifndef _OBJTOOL_ARCH_ELF
|
|
#define _OBJTOOL_ARCH_ELF
|
|
|
|
#define R_NONE R_X86_64_NONE
|
|
|
|
#endif /* _OBJTOOL_ARCH_ELF */
|