From patchwork Mon Oct 16 13:24:39 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Rutland X-Patchwork-Id: 115918 Delivered-To: patch@linaro.org Received: by 10.140.22.163 with SMTP id 32csp3683403qgn; Mon, 16 Oct 2017 06:25:04 -0700 (PDT) X-Google-Smtp-Source: AOwi7QA2kR01IHa19Dtz5weK+2AiobhVS9q7eIZoz6YKmzz9rIhnxsc8yPWiJrJ5jZVQErTiRpdh X-Received: by 10.98.87.74 with SMTP id l71mr8808059pfb.204.1508160304575; Mon, 16 Oct 2017 06:25:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1508160304; cv=none; d=google.com; s=arc-20160816; b=C5qN0lTUK0RfxalZxLX1nMDBH7BqGe4GTtGyf3Ns3dy0my3aAVe3S9pdIVrnkDO2Vt LUcvXBrAYl7IuI+UiAOu+483M5XndnSlJ08f0PiIukjT0/ec5RvHO6F62S5AigwV0aB1 7VDvt57xx424OrbjranEbxAmFl6IBDdpTPtMczSLPR/RnRyZ5RC074tdkevfSxMmnsJq GpKPmEras0SIGOKIIEQdO11JhnFw0pVAYnMbjEHKeEK4/qcm13y0ZgworuIULpp4jsKT iOBTYbsONh6NhR/Q22ZGGju1bBem+uX5rHZeiofboMbzRzT1qU3Dxyhpz/+x5BI2QE9g rygw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=bhkPgZSCqJ4DwMv+2sZFZOJBU3dpngJ12tCTBXUYpGo=; b=UM0FA4u1/yMZ2Q2Xs0amFs95yql6rINuHehKPpOMc1HsdKI5OD+iauSI1hWmqUjrem jQoQIQzXr0gW0jVevtwHJYJx2GiIBfjxnNkRWQ2lt7/O7QWWZd2hYLehHY1gTH6it5NJ Qfj4qUJ3aisOM3sfSf4MfaWdjfku43cTJnu8IMQMUtAKvBgbuTDQR3ORvUy46zLJf9ha HlEhWOtFdy+OEwm/yPSOJPg91ko2FpmMHduxkFIpKOHwYBihJenaS34uMUmJ7zIhzwef 4Cncdhmja806BY4aBwdqnPSbgRumZH1a/FE50WXu5+ftckfd3497osRqfKApS4Wt+b4/ 8Oqw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n19si4092776pgd.755.2017.10.16.06.25.04; Mon, 16 Oct 2017 06:25:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753086AbdJPNZD (ORCPT + 27 others); Mon, 16 Oct 2017 09:25:03 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:56948 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753066AbdJPNZB (ORCPT ); Mon, 16 Oct 2017 09:25:01 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id EABF81684; Mon, 16 Oct 2017 06:25:00 -0700 (PDT) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id AB72D3F53D; Mon, 16 Oct 2017 06:24:58 -0700 (PDT) From: Mark Rutland To: linux-arm-kernel@lists.infradead.org Cc: linux-kernel@vger.kernel.org, adech.fo@gmail.com, aryabinin@virtuozzo.com, catalin.marinas@arm.com, christoffer.dall@linaro.org, dvyukov@google.com, linux-kbuild@vger.kernel.org, mark.rutland@arm.com, mark.zyngier@arm.com, mmarek@suse.com, will.deacon@arm.com, yamada.masahiro@socionext.com Subject: [PATCH 3/4] kvm/arm64: simplify CC instrumentation opt-out Date: Mon, 16 Oct 2017 14:24:39 +0100 Message-Id: <20171016132440.38098-4-mark.rutland@arm.com> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20171016132440.38098-1-mark.rutland@arm.com> References: <20171016132440.38098-1-mark.rutland@arm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Now that we can opt out of all instrumentation with a single option, make use of this in the KVM hyp code. Hopefully, this will also avoid fragility as new options are introduced. Signed-off-by: Mark Rutland Cc: Catalin Marinas Cc: Christoffer Dall Cc: Marc Zyngier Cc: Will Deacon --- arch/arm64/kvm/hyp/Makefile | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) -- 2.11.0 Acked-by: Christoffer Dall diff --git a/arch/arm64/kvm/hyp/Makefile b/arch/arm64/kvm/hyp/Makefile index 14c4e3b14bcb..a8a212eb66f1 100644 --- a/arch/arm64/kvm/hyp/Makefile +++ b/arch/arm64/kvm/hyp/Makefile @@ -22,7 +22,4 @@ obj-$(CONFIG_KVM_ARM_HOST) += s2-setup.o # KVM code is run at a different exception code with a different map, so # compiler instrumentation that inserts callbacks or checks into the code may # cause crashes. Just disable it. -GCOV_PROFILE := n -KASAN_SANITIZE := n -UBSAN_SANITIZE := n -KCOV_INSTRUMENT := n +CC_INSTRUMENT := n