From patchwork Mon Oct 16 13:24:36 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Rutland X-Patchwork-Id: 115915 Delivered-To: patch@linaro.org Received: by 10.140.22.163 with SMTP id 32csp3683226qgn; Mon, 16 Oct 2017 06:24:52 -0700 (PDT) X-Google-Smtp-Source: AOwi7QCtJzyXAwUonsfVn192ssP4qTIxDKlvZkJNd6iOF8k7h8mJ5UXNEALOogxXo9w/IHfJE4VA X-Received: by 10.99.8.5 with SMTP id 5mr8230595pgi.28.1508160292417; Mon, 16 Oct 2017 06:24:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1508160292; cv=none; d=google.com; s=arc-20160816; b=lr9VymP0xl5knxLhI3oWKmKQttWCV8OhjGXA4yBxi4HfSQD6x8Ntua73ZWd6TfDJ1z eE7P0L1D0RoLSuaVxSrFWJ9DDlmHfIoAwLwD2qFAz27+iClI0L8SUMf+NcmO3snrVzdL qelgPWdhTiSEIyljgchbSA0UIxeB9gQdiR6zcacxTNC5UyD+S99/30s56ZxoO/FEaymQ BxRrg1FzQH1nEQHH/udY6hlOG+GulUyLAgihY68oPWi/fo1MzD2fR7QS/+YvT0/S5v/2 +WC2O1dOIhL0PPV7jNlvBqKJRoNFo2lrKg+hCD7JuzgJftZN72b8FGKDpDpQ1nd0C4XY TArw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=n1/1fnCl+1VAEPPjsq2h6raxYI+nLlWJIIK3HoQRQVE=; b=i2Qk7dYyJKMgskNuasRCJjEgJSj/563Dj20x7j8wjBYi8Q6KYU5ZCx+vASAeCBQN43 dRsUJx1X4sWXvIgbpFWxV9eKFEaK5DRDKlc/GWE69lIVaSU4GG2JHH+vGHvlIeBE1086 3NapMb3IMpf1tH5aWR3CqgT0JwHob6VrjiIXGhmknR0hta9I3fbBgVllB3nlj+y9kBrF DWhpPMO5QCBcjmmIV746pGyQQQVTUCQqfdCt8x4iSENtLZDarCccyMkRR5UM4iGQDM9e KtbiBVSzaYpbVTQZHzzPSEs6SLcFAVBSgXTb4QTme9PaqyKNey4L4xLgD3Tef5BSCIaj GJEg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d4si4392751pfl.429.2017.10.16.06.24.52; Mon, 16 Oct 2017 06:24:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753008AbdJPNYt (ORCPT + 27 others); Mon, 16 Oct 2017 09:24:49 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:56892 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752441AbdJPNYs (ORCPT ); Mon, 16 Oct 2017 09:24:48 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id ACC1E1529; Mon, 16 Oct 2017 06:24:47 -0700 (PDT) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 6B8F43F53D; Mon, 16 Oct 2017 06:24:45 -0700 (PDT) From: Mark Rutland To: linux-arm-kernel@lists.infradead.org Cc: linux-kernel@vger.kernel.org, adech.fo@gmail.com, aryabinin@virtuozzo.com, catalin.marinas@arm.com, christoffer.dall@linaro.org, dvyukov@google.com, linux-kbuild@vger.kernel.org, mark.rutland@arm.com, mark.zyngier@arm.com, mmarek@suse.com, will.deacon@arm.com, yamada.masahiro@socionext.com Subject: [PATCH 0/4] Cleanup instrumentation avoidance Date: Mon, 16 Oct 2017 14:24:36 +0100 Message-Id: <20171016132440.38098-1-mark.rutland@arm.com> X-Mailer: git-send-email 2.11.0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Recently we spotted that some code with special ABI requirements was being instrumented by KCOV [1], and we need to avoid all instrumentation in this case. While it's possible to disable each instrumentation option manually, this is tedious and error prone as new options are introduced. This series adds a new CC_INSTRUMENT option which can be used to disable all instrumentation of a given file or directory, and makes use of this throught arm64. There are other places where this could be used (e.g. the EFI stub), but I've avoided altering those for now in the hope that this can be taken via the arm64 tree. Thanks, Mark. [1] http://lists.infradead.org/pipermail/linux-arm-kernel/2017-September/533105.html Mark Rutland (4): kbuild: allow global override of CC instrumentation arm64: prevent instrumentation of LL/SC atomics kvm/arm64: simplify CC instrumentation opt-out arm64: vdso: remove pointless gcov option arch/arm64/kernel/vdso/Makefile | 3 --- arch/arm64/kvm/hyp/Makefile | 5 +---- arch/arm64/lib/Makefile | 1 + scripts/Makefile.lib | 17 +++++++++++++---- 4 files changed, 15 insertions(+), 11 deletions(-) -- 2.11.0