[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87bk1gg6px.ffs@tglx>
Date: Sun, 25 Aug 2024 13:52:26 +0200
From: Thomas Gleixner <tglx@...utronix.de>
To: Wentao Zhang <wentaoz5@...inois.edu>, linux-kbuild@...r.kernel.org,
linux-kernel@...r.kernel.org, linux-efi@...r.kernel.org,
linux-um@...ts.infradead.org, linux-arch@...r.kernel.org,
linux-trace-kernel@...r.kernel.org, llvm@...ts.linux.dev, x86@...nel.org
Cc: wentaoz5@...inois.edu, marinov@...inois.edu, tyxu@...inois.edu,
jinghao7@...inois.edu, tingxur@...inois.edu,
steven.h.vanderleest@...ing.com, chuck.wolber@...ing.com,
matthew.l.weber3@...ing.com, Matt.Kelly2@...ing.com,
andrew.j.oppelt@...ing.com, samuel.sarkisian@...ing.com, morbo@...gle.com,
samitolvanen@...gle.com, masahiroy@...nel.org, mingo@...hat.com,
bp@...en8.de, dave.hansen@...ux.intel.com, luto@...nel.org,
ardb@...nel.org, richard@....at, anton.ivanov@...bridgegreys.com,
johannes@...solutions.net, arnd@...db.de, rostedt@...dmis.org,
mhiramat@...nel.org, oberpar@...ux.ibm.com, akpm@...ux-foundation.org,
paulmck@...nel.org, bhelgaas@...gle.com, kees@...nel.org,
jpoimboe@...nel.org, peterz@...radead.org, kent.overstreet@...ux.dev,
nathan@...nel.org, hpa@...or.com, mathieu.desnoyers@...icios.com,
ndesaulniers@...gle.com, justinstitt@...gle.com, maskray@...gle.com,
dvyukov@...gle.com
Subject: Re: [RFC PATCH 1/3] llvm-cov: add Clang's Source-based Code
Coverage support
On Sat, Aug 24 2024 at 18:06, Wentao Zhang wrote:
> Makefile | 3 +
> arch/Kconfig | 1 +
> arch/x86/Kconfig | 1 +
> arch/x86/kernel/vmlinux.lds.S | 2 +
> include/asm-generic/vmlinux.lds.h | 38 +++++
> kernel/Makefile | 1 +
> kernel/llvm-cov/Kconfig | 29 ++++
> kernel/llvm-cov/Makefile | 5 +
> kernel/llvm-cov/fs.c | 253 ++++++++++++++++++++++++++++++
> kernel/llvm-cov/llvm-cov.h | 156 ++++++++++++++++++
> scripts/Makefile.lib | 10 ++
> scripts/mod/modpost.c | 2 +
Please split this into two parts:
1) Add the infrastructure
2) Enable it on x86
Also the ordering of this patch series is wrong.
First you enable it on x86 and then you mark the places which cannot be
instrumented. You really want to do this in this order:
1) Add the infrastructure
2) Prevent instrumentation in drivers/firmware
3) Prevent instrumentation in kernel/trace
4) Prevent instrumentation in modfinal
5) Prevent instrumentation in x86
6) Enable it on x86
Thanks,
tglx
Powered by blists - more mailing lists