Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4703805pxj; Tue, 25 May 2021 14:25:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJypmhJh5gpuurkLd3yL5fTb0RTaxiyofuGEZCCD9C5fkQPW0kcJZ2E+0At2BM9oPGoCJkz9 X-Received: by 2002:a6b:8e92:: with SMTP id q140mr2811888iod.81.1621977942270; Tue, 25 May 2021 14:25:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621977942; cv=none; d=google.com; s=arc-20160816; b=D6myWWhJupyDx6WY8HK2fDAtqm+Uf8I5CGYvsfK5rlF0SOF2QEGNPFE/2UpWvpxCxm FAE0bGBsN3Jv7gBazzSkAIOVSTx2xvqA2yweTIl+DEtjzFMLDNJe7WxZ+8BVjQpibGJb uoy8pKEw5S7OqlrRGpW8ny8GvHqJ8t1Ev4FAxufAWYik0jTd1Os2mB1eenV3x+lNJkJj sgii9sGlT3acb2TUlE0n8UGtsBkUmVNaKg3SsYCUximrK73ZIcA5MiQpXlf9sL2MXhgK E8QsUyWmCkzSnNZ4QpvPzBFsROADvOa1JHd+y5klGvfrBNA8B7AiDPDSgG1w0yjLd0la JJ4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:mime-version:message-id:date :dkim-signature; bh=O+kNZR25+vDl6MdOvHlxMTavYKFo24nOs+bV5Xh/gL4=; b=zaxPNDhxn125u1C7agWLwxWd7G1lNIH9LnyFY2SmurWkM4fVoQlGHfbAeiUOW4FTSs jN1OvCoGRVc3eUmutN4w3AT1KC73tV6a+29jdnSHYBc++l/M18bqLSCMpthltt4l6OZT Nxzz/c5xjt4bUCVkuNcyRblQaE1/+E3ABOTtendG3s/9pvLSQSk47dlGP3V94pOZ0NUZ 819+E7bhxlk0fNtGBRvEwKXY7ImhCMpJu3CNDEFtRhuGcfad3Zz9YvrDF8zN2hpR/FHi ZoHmsn5tOLiN3mc8XQPhQaI8nBrjmSG8DYtEDRg6TKDpzOeTUDLObz3I8iaUohLCItN8 gaVg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=TNKdPm5L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n12si19512091jat.1.2021.05.25.14.25.28; Tue, 25 May 2021 14:25:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=TNKdPm5L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233118AbhEYSAl (ORCPT + 99 others); Tue, 25 May 2021 14:00:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38650 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233119AbhEYSAk (ORCPT ); Tue, 25 May 2021 14:00:40 -0400 Received: from mail-qv1-xf49.google.com (mail-qv1-xf49.google.com [IPv6:2607:f8b0:4864:20::f49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 46764C061574 for ; Tue, 25 May 2021 10:59:09 -0700 (PDT) Received: by mail-qv1-xf49.google.com with SMTP id x2-20020a0cda020000b02901edb4c412fdso31209807qvj.11 for ; Tue, 25 May 2021 10:59:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:message-id:mime-version:subject:from:to:cc; bh=O+kNZR25+vDl6MdOvHlxMTavYKFo24nOs+bV5Xh/gL4=; b=TNKdPm5Lc8m5Yr+Q0Kghvn98kwQPuxloIzdloAJ9QEagHnLD2iGfLjzxZeonKnpoG/ TUEp4jFciIHVj73vOLyYeZoDZmoNKjDQ34szJG+z0PDWewTcqraYOscZjJ9vCNh2urKJ GQGdOiSsAs62JvqYeoRdBW0JZeHKEmp7ozjO1FTp2wp9b/HqWj9AllUMGsPFPIo20l+u CKM9/ChrQraKYuNNtEY+gcEyPreHROGOrlSbisWygQYDS0L94zXMUKXq23QG3Etok5v+ HyOhNdIwhLJvCYREDN7uOqNTmokffw6ZZUo1rYPu/m9eW0nEyCozmLi8DoRf4epIdAs4 o1dw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=O+kNZR25+vDl6MdOvHlxMTavYKFo24nOs+bV5Xh/gL4=; b=D55ok01/lQPS8Ch1Xjk1+739H17Xbas/sd3zrQYx+49dgSo9C32WugGxfuPaZHVYAD y5ewLJL+NsCZ9vjk34daV7EmaA300y5JoiV+L7Qlymh0UwtrCAWID2Mtfo/9VANAdcQa 9HtA8304LvSLjEp7ppk8KzwhIWWjSgkNKMmQu9Jg7zt3dBvT2ZiHFytDZjrfLqHjhOSM bEtvnz06FvzLz21Wx23141Bd7hCWzgiw5CABcg/qqRIZvw96vxnJZBAFyQYryhnOJOC3 ZDQ7m74jVCAFaGOF0CqjGY99nkkr0lwYPDPqvsWbUd0ZLkeFNjwtQGjfQwBP+UaA6zFL ue8A== X-Gm-Message-State: AOAM5339gZMnvBVUxh0Pw96KOopky+KUaPL+glwwnLC1XGY64mRr5px3 oDjeeWBLdOT1SWRu+iXknGLkxv2zSA== X-Received: from elver.muc.corp.google.com ([2a00:79e0:15:13:b328:d556:de65:97a2]) (user=elver job=sendgmr) by 2002:ad4:4e67:: with SMTP id ec7mr38673270qvb.58.1621965548449; Tue, 25 May 2021 10:59:08 -0700 (PDT) Date: Tue, 25 May 2021 19:58:19 +0200 Message-Id: <20210525175819.699786-1-elver@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.31.1.818.g46aad6cb9e-goog Subject: [PATCH] kcov: add __no_sanitize_coverage to fix noinstr for all architectures From: Marco Elver To: elver@google.com Cc: linux-kernel@vger.kernel.org, nathan@kernel.org, ndesaulniers@google.com, ojeda@kernel.org, keescook@chromium.org, akpm@linux-foundation.org, will@kernel.org, ardb@kernel.org, luc.vanoostenryck@gmail.com, nivedita@alum.mit.edu, masahiroy@kernel.org, peterz@infradead.org, samitolvanen@google.com, arnd@arndb.de, clang-built-linux@googlegroups.com, Dmitry Vyukov , Mark Rutland Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Until now no compiler supported an attribute to disable coverage instrumentation as used by KCOV. To work around this limitation on x86, noinstr functions have their coverage instrumentation turned into nops by objtool. However, this solution doesn't scale automatically to other architectures, such as arm64, which are migrating to use the generic entry code. Clang [1] and GCC [2] have added support for the attribute recently. [1] https://github.com/llvm/llvm-project/commit/280333021e9550d80f5c1152a34e33e81df1e178 [2] https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=cec4d4a6782c9bd8d071839c50a239c49caca689 Add __no_sanitize_coverage for both compilers, and add it to noinstr. Signed-off-by: Marco Elver --- include/linux/compiler-clang.h | 6 ++++++ include/linux/compiler-gcc.h | 6 ++++++ include/linux/compiler_types.h | 2 +- 3 files changed, 13 insertions(+), 1 deletion(-) diff --git a/include/linux/compiler-clang.h b/include/linux/compiler-clang.h index adbe76b203e2..370565f4cfde 100644 --- a/include/linux/compiler-clang.h +++ b/include/linux/compiler-clang.h @@ -45,6 +45,12 @@ #define __no_sanitize_undefined #endif +#if defined(CONFIG_KCOV) && CONFIG_CLANG_VERSION >= 130000 +#define __no_sanitize_coverage __attribute__((no_sanitize("coverage"))) +#else +#define __no_sanitize_coverage +#endif + /* * Not all versions of clang implement the type-generic versions * of the builtin overflow checkers. Fortunately, clang implements diff --git a/include/linux/compiler-gcc.h b/include/linux/compiler-gcc.h index 5d97ef738a57..cb9217fc60af 100644 --- a/include/linux/compiler-gcc.h +++ b/include/linux/compiler-gcc.h @@ -122,6 +122,12 @@ #define __no_sanitize_undefined #endif +#if defined(CONFIG_KCOV) && __has_attribute(__no_sanitize_coverage__) +#define __no_sanitize_coverage __attribute__((no_sanitize_coverage)) +#else +#define __no_sanitize_coverage +#endif + #if GCC_VERSION >= 50100 #define COMPILER_HAS_GENERIC_BUILTIN_OVERFLOW 1 #endif diff --git a/include/linux/compiler_types.h b/include/linux/compiler_types.h index d29bda7f6ebd..cc2bee7f0977 100644 --- a/include/linux/compiler_types.h +++ b/include/linux/compiler_types.h @@ -210,7 +210,7 @@ struct ftrace_likely_data { /* Section for code which can't be instrumented at all */ #define noinstr \ noinline notrace __attribute((__section__(".noinstr.text"))) \ - __no_kcsan __no_sanitize_address + __no_kcsan __no_sanitize_address __no_sanitize_coverage #endif /* __KERNEL__ */ -- 2.31.1.818.g46aad6cb9e-goog