From nobody Mon Dec 15 23:27:41 2025 Received: from mail-wm1-f74.google.com (mail-wm1-f74.google.com [209.85.128.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A200532C934 for ; Mon, 15 Dec 2025 10:12:46 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.74 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765793569; cv=none; b=M7epDLbxqMTs0MOwZj7qlpqtsDmr2lM0xDBtGAQ10pzzikrXtrTIeqBVSbpy5CFAQ5RMI1iy5tFyFPGtt/aWJwiavs0lIPrr4xjEN4/U8vO4JORcO+3bQY3S1U+6XUp4dkWgwzCnY7e5QUnQ5v0inlx4kQJaSVREytdDRfGlaJE= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765793569; c=relaxed/simple; bh=UqT3/wpgbl7D5Ah8gT/lzqQXa/i5498DuuatCip0UAg=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=tSHlkboiKcCCto9hP5kKG0kk9Zik1Adr0N9aenlm2dkqP3mASuibJqg6/dNFRpN0RUvqTG5nmuI1j8sqFzff9FlEWm5XXF6HUQqQ9HrwlBocAM0b4jkyGVqTNiBlbfCc7MuQ+NTgJEXf640iUqIGY4PskQ1R+7HElWEwb1s4EDQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--jackmanb.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=zeFTnQbD; arc=none smtp.client-ip=209.85.128.74 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--jackmanb.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="zeFTnQbD" Received: by mail-wm1-f74.google.com with SMTP id 5b1f17b1804b1-477cf2230c8so32076785e9.0 for ; Mon, 15 Dec 2025 02:12:46 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1765793564; x=1766398364; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=uP2brnCrErMSve8D4fzLeDUYWZS9bjiXvF2HnuazcK4=; b=zeFTnQbDmr+W/NAOx+q27Y+g9BZtYOOYasQ0HacTzZeEj8LIv/pDAZ5377eEuYB5MR ATFt6Bn5FcINQ9SuX51+L4l3sAqueVOYvJ6to9tFgAVkRilOFOuakPtjHvmRg2JNcM4D laxiJmAr96eQYhNnMIDoe+CCBhUMKEy/FafFNEhgZ3nbGLTiPlLp8lxZL++M9jf7rZyR hjMSgjWeLHwooGRk1cMg6BvuKkU0wsMm/FIE9c0JJuGEIAy/vcuOmf/wYFapurUHnH7S 9aMHYoQMrv52TG91ZDKhXQYO8cUjl5lAmf6WZflaAaERM83cpRdRIr2SzpA4odRb/9EH TMWg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1765793564; x=1766398364; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=uP2brnCrErMSve8D4fzLeDUYWZS9bjiXvF2HnuazcK4=; b=RZv1C7bFeoeSntlnJAtyfdg0ZMSaLr09pn9Md4d8bV72cm2WQil/duxPdSLu0t9pzY +E1vWyyWlbyYPtOoUryZlaLLFcEU22gyqZCN2W/eLObJu6aSPPwgGlBFtsSFrcunZGe9 Y3WMwbY41WEfi8TUQyFCjc1nAwLQGS2DAft/NdKDUb4HSuo/D2cLi4xg+9QRF6SR9Th2 05Y2DIVEujXomX8LARL4vk2nlGMryMoMTZ3CgnMaAeALsZtjBeC8JsgznDrk4HWBVVpA 2ubaKZ5YhnLUF+W21mvjLpDvYKUHF0nTVz7vo02AbXkg3slci96nv8bt8iqPJ4ovUxlG q/FQ== X-Forwarded-Encrypted: i=1; AJvYcCV//tLsJEbFM86sbmQQMPA2qeSi4lmJfrCoNaRnj1f4UCEvcBvvGnPJrqrGkbkLqPI+4ZFMWIgxApzW3YA=@vger.kernel.org X-Gm-Message-State: AOJu0YwD2e6np3efB4tGL61ytipn5l1LBQGgFplhsfaEleO2ckQ6DS0u E/Qm2rA/a3n8k/Ol000gfh7/RMiZI360RH7ei6CjycL/S6Th4Nz9AbJvjO3h5/rMb105MHCY5sf 8XgzYSkRIc9CCBA== X-Google-Smtp-Source: AGHT+IGSbqu5xE7B4l/I8SGE+7Lkk0jHS4AQNVRVIyrK10o2tEnZX5btkplDv/DXrTHsyfvPuMNxanzYFRAiZA== X-Received: from wmgg8.prod.google.com ([2002:a05:600d:8:b0:477:93dd:bbb1]) (user=jackmanb job=prod-delivery.src-stubby-dispatcher) by 2002:a05:600c:35c1:b0:477:7a53:f493 with SMTP id 5b1f17b1804b1-47a9ddef66emr29398925e9.23.1765793564542; Mon, 15 Dec 2025 02:12:44 -0800 (PST) Date: Mon, 15 Dec 2025 10:12:39 +0000 In-Reply-To: <20251215-gcov-inline-noinstr-v2-0-6f100b94fa99@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251215-gcov-inline-noinstr-v2-0-6f100b94fa99@google.com> X-Mailer: b4 0.14.2 Message-ID: <20251215-gcov-inline-noinstr-v2-1-6f100b94fa99@google.com> Subject: [PATCH v2 1/3] kasan: mark !__SANITIZE_ADDRESS__ stubs __always_inline From: Brendan Jackman To: Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Vincenzo Frascino , Marco Elver , Ard Biesheuvel Cc: kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, Brendan Jackman Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The x86 instrumented bitops in include/asm-generic/bitops/instrumented-non-atomic.h are KASAN-instrumented via explicit calls to instrument_* functions from include/linux/instrumented.h. This bitops are used from noinstr code in __sev_es_nmi_complete(). This code avoids noinstr violations by disabling __SANITIZE_ADDRESS__ etc for the compilation unit. However, when GCOV is enabled, there can still be violations caused by the stub versions of these functions, since coverage instrumentation is injected that causes them to be out-of-lined. Fix this by just applying __always_inline. Signed-off-by: Brendan Jackman Acked-by: Marco Elver --- include/linux/kasan-checks.h | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/include/linux/kasan-checks.h b/include/linux/kasan-checks.h index 3d6d22a25bdc391c0015a6daf2249d6bea752dcb..9aa0f1cc90133ca334afa478b5f= 762aef9e5d79c 100644 --- a/include/linux/kasan-checks.h +++ b/include/linux/kasan-checks.h @@ -37,11 +37,11 @@ static inline bool __kasan_check_write(const volatile v= oid *p, unsigned int size #define kasan_check_read __kasan_check_read #define kasan_check_write __kasan_check_write #else -static inline bool kasan_check_read(const volatile void *p, unsigned int s= ize) +static __always_inline bool kasan_check_read(const volatile void *p, unsig= ned int size) { return true; } -static inline bool kasan_check_write(const volatile void *p, unsigned int = size) +static __always_inline bool kasan_check_write(const volatile void *p, unsi= gned int size) { return true; } --=20 2.50.1 From nobody Mon Dec 15 23:27:41 2025 Received: from mail-wm1-f74.google.com (mail-wm1-f74.google.com [209.85.128.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2092B32D0E1 for ; Mon, 15 Dec 2025 10:12:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.74 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765793571; cv=none; b=uAFo1wSgrA5/Ei6NW+yWhkgGTIP86T+IZRf/UulsSfcEjD59nc2OnfxMH0+pL4sFYR+AQ54der84ckm325dM3C3POAfIkZ8mYPvNeQb6dnx9430cAeI5cJRtZObiyLhlbAFWqIvqalij3MqjGwrgxX1/h6eJzYfZkFGvNh2qO7Q= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765793571; c=relaxed/simple; bh=11wsYDd1ageduPhjInorxGZn6vfSPrePO8tw3pnlVF0=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=JlWy8Gsqi0kq15Y+ncbvsQmS/FQYDa8ctrA3rU8rTDcVjngT8X4DDwqQs03aEhm+BlFJUDagZXm/8/iuRMVKyXJyK7yAeSkCVTnp5UfM/sEwcnVkNiwcnmBElYou/fSasNgCIIcRXSnTyofaY03nEEkCnt0VM/dB075mPICtNZI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--jackmanb.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=T8+Kn8oh; arc=none smtp.client-ip=209.85.128.74 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--jackmanb.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="T8+Kn8oh" Received: by mail-wm1-f74.google.com with SMTP id 5b1f17b1804b1-4779edba8f3so22781765e9.3 for ; Mon, 15 Dec 2025 02:12:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1765793566; x=1766398366; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=bshBqgsRdcmZdxF7GIqf7PfJK3Mj7lfZN/mjH8j2lVs=; b=T8+Kn8ohKhtRxXTOkVymtwWcKnoTVwipUk5N5EGcX0qiAve+0HO4McwWe5+g+CKYgU B47FtKSZdz2fJxMRiNxsN9SHi5XEl5Ysf9KO4weGELP8E77kIBax+Qg2CjM9UWrlwNvV M7cuoyOwuM8keaopZkw0r1IbE2ThSg7N9g82JvNAEJQ2hOh1GWTQgandjIlBMnFcPYrQ OdMhhGc3szpE2bxwMHEnI6EB47o1jePEYISoI4heDZSxtkYvJVARnXXx/Gkzt3wrN0kY jIfE0Th+rAxXSTTNXlhqJ3nYVP4lxkprmJk7NgDocT6uz/W1sdOA81QUdQuCBUnbfuOf k7Ew== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1765793566; x=1766398366; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=bshBqgsRdcmZdxF7GIqf7PfJK3Mj7lfZN/mjH8j2lVs=; b=D027jAed374GeBPPOJK36VijGoiAZStQgRfra0gSnIv60mzYuQGKMQChLkH4q/+swV +dLykvX7yWNkPdXUaNC5OCI/RMRbkDUdFV84yKBYO12S/F0MSezc/dwX/sx8gEepRUq7 CffQQSUduJ8uff0wuiBeU+BJhfRoXQvLDvdG8PeMsRDvQhGDUdlauPhYXT9owVveQlLZ muoh51yF7nJLNlhkOVQExsb6K+qHw2NVOXetNwlyofS3aNvXnNBUP3AGfOjSQHrn/vWm v4b+KXT0HWMCx5XK7irZDXEW5Rr5EDQ/jg8DJnATNoFLb3mxtIQ/+DX07+QCKVsB7QvL ttPw== X-Forwarded-Encrypted: i=1; AJvYcCXeYKarh8mI3Nx56iJXSysr5hSqjN+0GuMcAypthgYWyKm6HxPLN7j8GR1cfsE1i7wwTfklu2zDlNteruk=@vger.kernel.org X-Gm-Message-State: AOJu0Yzbqs7otqZobseDxsRDWhVoHa4Q/OXE9zjWnZG5YHVFAhtL1Qyy hs3oVbhliu/ZF7zBtreX4hnjYTXMH6jWRPGlmNjy1SU+EPPzat0I2JbmYQk61cOWarASO14HbwF u9/y5/3ZtcDLM6Q== X-Google-Smtp-Source: AGHT+IHGlryi+cYLXwM55kmZmALY5TXkCvvmL9CPPffN6mbmIvNZtnSV/S6/qXNLmDDgVG5fMRUQc7zXfdrTHA== X-Received: from wmbgx1.prod.google.com ([2002:a05:600c:8581:b0:477:9856:8f53]) (user=jackmanb job=prod-delivery.src-stubby-dispatcher) by 2002:a05:600c:4f84:b0:477:7b16:5f88 with SMTP id 5b1f17b1804b1-47a8f8a7f7amr110860185e9.6.1765793565696; Mon, 15 Dec 2025 02:12:45 -0800 (PST) Date: Mon, 15 Dec 2025 10:12:40 +0000 In-Reply-To: <20251215-gcov-inline-noinstr-v2-0-6f100b94fa99@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251215-gcov-inline-noinstr-v2-0-6f100b94fa99@google.com> X-Mailer: b4 0.14.2 Message-ID: <20251215-gcov-inline-noinstr-v2-2-6f100b94fa99@google.com> Subject: [PATCH v2 2/3] kcsan: mark !__SANITIZE_THREAD__ stub __always_inline From: Brendan Jackman To: Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Vincenzo Frascino , Marco Elver , Ard Biesheuvel Cc: kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, Brendan Jackman Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The x86 instrumented bitops in include/asm-generic/bitops/instrumented-non-atomic.h are KCSAN-instrumented via explicit calls to instrument_* functions from include/linux/instrumented.h. This bitops are used from noinstr code in __sev_es_nmi_complete(). This code avoids noinstr violations by disabling __SANITIZE_THREAD__ etc for the compilation unit. However, when GCOV is enabled, there can still be violations caused by the stub versions of these functions, since coverage instrumentation is injected that causes them to be out-of-lined. Fix this by just applying __always_inline. Signed-off-by: Brendan Jackman Acked-by: Marco Elver --- include/linux/kcsan-checks.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/linux/kcsan-checks.h b/include/linux/kcsan-checks.h index 92f3843d9ebb8177432bb4eccc151ea66d3dcbb7..cabb2ae46bdc0963bd89533777c= ab586ab4d5a1b 100644 --- a/include/linux/kcsan-checks.h +++ b/include/linux/kcsan-checks.h @@ -226,7 +226,7 @@ static inline void kcsan_end_scoped_access(struct kcsan= _scoped_access *sa) { } #define __kcsan_disable_current kcsan_disable_current #define __kcsan_enable_current kcsan_enable_current_nowarn #else /* __SANITIZE_THREAD__ */ -static inline void kcsan_check_access(const volatile void *ptr, size_t siz= e, +static __always_inline void kcsan_check_access(const volatile void *ptr, s= ize_t size, int type) { } static inline void __kcsan_enable_current(void) { } static inline void __kcsan_disable_current(void) { } --=20 2.50.1 From nobody Mon Dec 15 23:27:41 2025 Received: from mail-wm1-f73.google.com (mail-wm1-f73.google.com [209.85.128.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 39BD332C938 for ; Mon, 15 Dec 2025 10:12:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.73 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765793573; cv=none; b=HOhf1+G1+ZM2sBxyRLEIgXynyj4r1SNqJn4y7rB1/IxXxOWNxu8q7TnUdhWqR/SdVWivIegc9p3naim7XYQAW+9eDqW0wK47XDbUUcKuYkjfKALS+YW/ivtMaohy59Mi5X166K85lQQ7xWZZEF6lGsqP/Kw+TrwY5GAXvK3++zg= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765793573; c=relaxed/simple; bh=inD0vuzY52gOH2nE9ERpF+9ByKT4ccPlPybBeV0pgH8=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=NLEUXaaclySYJcypfswQ6MpXWWnhwTImanEGvRb3Y4pnisM1CC/pfowGn7rHb9QhkrCbB806myPv66hXIAOSIQhmPIVgzgF4I5aMGjAVTGWY+/zIS6EMDU9r3DTyPLhYv3/9No44LHP4U69rXAf3w/aDFYNiEke1GbMb35qlv4E= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--jackmanb.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=IPEK542t; arc=none smtp.client-ip=209.85.128.73 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--jackmanb.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="IPEK542t" Received: by mail-wm1-f73.google.com with SMTP id 5b1f17b1804b1-477563a0c75so21149685e9.1 for ; Mon, 15 Dec 2025 02:12:48 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1765793566; x=1766398366; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=eBg82DgwaEqXYt7FN7z5QKnLiVSgwPtdomNA9XrlWso=; b=IPEK542twE4Dq6VVBjTlVTF1KRn5rwqzc485j5LM1zqgGQqMM4EZ3Kb50GJ44XmvIc RIME6WCWAOokPMFTr1kAA/GgfgbHOf+fzO3xNMAKjC4e3OowAk+WFUahe93W7G7orhoc 8timhPc+47d/Ll19gGwyLhpPvmqnWG5qjivshHInDR5rUKlztYoeqbAif+6jgZcNfJQB Eg4rnrE0gcOSr1oa4KfuMq8rXDZLadXrqVr0aN/+X8RKbC67ohVIuY3Yth6O4mvmykMY SuPNdk7Dn8+OBl/OaLt1/J0jNRclq6X464TaNWXb0xAF2Y5nIufyH2Rt835mfzchnxOJ Xn7g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1765793566; x=1766398366; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=eBg82DgwaEqXYt7FN7z5QKnLiVSgwPtdomNA9XrlWso=; b=XvxPTDESmMZw1y/LPXgOXcnwY+TSQ0s7F24k1HY8lPt7tTYMjie7GzdxYjbtI3kKD9 zmnhhMSG5tL6lqd6K5AIe4sJLGpwPI/dBqM5xqTRyKG8B8ZWOI4iWFvK7q9VSJkpq0// XCjtjWvU4WbjLpnxXQRh2txQDvAY1H+6OvRJd45tg/SshnN3gkh2EkiDPCC5ixq5jXqn A4IBVmRi33Xe0VSB51pKGJ2V71s6FckEMwgBrj9wPkV8DwyhZLYvGoiymTObwzh+Wmt8 lw5ZGJB5q4/eLMz2TtV7OzBdyviL5EOul1kUWINtVPhGthG+4dlayZ/QDewAO8s5GHaF +tKA== X-Forwarded-Encrypted: i=1; AJvYcCXEZX7gdXjimEO/dw0dwSaa1vYQt8/pTnfS6ByNkLwfNoKVF6ShwN6vq2NuHTreNeJ/rVknDjraIjI9BvI=@vger.kernel.org X-Gm-Message-State: AOJu0YyJ7lxPd6VCj/JGKlQDM04IKFMzL14UDbt25j1Ag9BgFFerIrY0 UqvOtG3YltmKlKYwyhft2yqdPAICFRU9zAhyFcaTRxB30DDD8kmzA6LTXSGJuzHdTzUqO5rROEG dhHocIcYwRhbdYQ== X-Google-Smtp-Source: AGHT+IE1tIJkiqP2RHxvcp9YYCeodWQSMnaL5XgjdI5QDvTTBIxrugJyFbVUmCjGLhvVceRtLPxU+LezEdB9Lg== X-Received: from wmpo35.prod.google.com ([2002:a05:600c:33a3:b0:477:14b1:69d7]) (user=jackmanb job=prod-delivery.src-stubby-dispatcher) by 2002:a05:600c:a08e:b0:479:2651:3f9c with SMTP id 5b1f17b1804b1-47a8f8c57e2mr96731575e9.14.1765793566702; Mon, 15 Dec 2025 02:12:46 -0800 (PST) Date: Mon, 15 Dec 2025 10:12:41 +0000 In-Reply-To: <20251215-gcov-inline-noinstr-v2-0-6f100b94fa99@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251215-gcov-inline-noinstr-v2-0-6f100b94fa99@google.com> X-Mailer: b4 0.14.2 Message-ID: <20251215-gcov-inline-noinstr-v2-3-6f100b94fa99@google.com> Subject: [PATCH v2 3/3] x86/sev: Disable GCOV on noinstr object From: Brendan Jackman To: Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Vincenzo Frascino , Marco Elver , Ard Biesheuvel Cc: kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, Brendan Jackman Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable With Debian clang version 19.1.7 (3+build5) there are calls to kasan_check_write() from __sev_es_nmi_complete, which violates noinstr. Fix it by disabling GCOV for the noinstr object, as has been done for previous such instrumentation issues. Note that this file already disables __SANITIZE_ADDRESS__ and __SANITIZE_THREAD__, thus calls like kasan_check_write() ought to be nops regardless of GCOV. This has been fixed in other patches. However, to avoid any other accidental instrumentation showing up, (and since, in principle GCOV is instrumentation and hence should be disabled for noinstr code anyway), disable GCOV overall as well. Signed-off-by: Brendan Jackman Acked-by: Marco Elver --- arch/x86/coco/sev/Makefile | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/coco/sev/Makefile b/arch/x86/coco/sev/Makefile index 3b8ae214a6a64de6bb208eb3b7c8bf12007ccc2c..b2e9ec2f69014fa3507d40c6c26= 6f1b74d634fcb 100644 --- a/arch/x86/coco/sev/Makefile +++ b/arch/x86/coco/sev/Makefile @@ -8,3 +8,5 @@ UBSAN_SANITIZE_noinstr.o :=3D n # GCC may fail to respect __no_sanitize_address or __no_kcsan when inlining KASAN_SANITIZE_noinstr.o :=3D n KCSAN_SANITIZE_noinstr.o :=3D n + +GCOV_PROFILE_noinstr.o :=3D n --=20 2.50.1