From nobody Fri Dec 19 11:45:26 2025 Received: from mail-wm1-f73.google.com (mail-wm1-f73.google.com [209.85.128.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5B27A314B88 for ; Tue, 16 Dec 2025 10:16:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.73 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765880210; cv=none; b=cjgPUgRiDpSMd9+f63BBl80/UxHs4HnD+Jv5t96HC8vJYHL1TRWwCkR9sDpnV7fqAMoixX8l07/INUMWy9kKe9WSSKRqy45buzazGTUM2GHTAtv9bysQKkBIgQoIAl1oohtK89uZTRG8emKbhSJrlbtVIbLI7iycW4JoVfD93C0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765880210; c=relaxed/simple; bh=UqT3/wpgbl7D5Ah8gT/lzqQXa/i5498DuuatCip0UAg=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=TDIw9kuKQw85snd44s5eearHQknvof9Ul/i1/Op/y5yINfUGiqriNzZsqwVQmpXnIeOiRatcD+CeGPM102nV0Kn9s8nb/5nrQupVbi7ECC5qL7LFePOj1+ooK68Dg+CscVqpgVyZe4KuQzpijZnyJQThZq2maZ25IgY1OuFgzPg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--jackmanb.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=2DJ436er; arc=none smtp.client-ip=209.85.128.73 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--jackmanb.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="2DJ436er" Received: by mail-wm1-f73.google.com with SMTP id 5b1f17b1804b1-47799717212so36777075e9.3 for ; Tue, 16 Dec 2025 02:16:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1765880206; x=1766485006; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=uP2brnCrErMSve8D4fzLeDUYWZS9bjiXvF2HnuazcK4=; b=2DJ436erVhSEPvoVwkb3qXbaBAnSf0F2gXr/uAV72oTJQqEqPyZ/l089iv16TOrRL0 Ruv4dURP8M2PomApMdYq+4aCJfdD/OIjZj7K+vby/s1SyDEs/OBBbt95Wr9mgHZWlLea ZyiUcQ4oG8JOXr+ibvUdYDzQ6xuvrzlHlcxycW83bACh0CDvS1pIK2r1+r4aoUUwaPDx ikEzpk7LkrDjrm98yXrvuqIduSKXWm0oxhEoWnpzyl1rER9V+1Cf2rph5TZB31LuCYQ1 oLdhHSTOAXqRHnzjB4UVKELWwEzeEAIvX2Y54bciA+JVWutB6KmEho+zt2ZkHU0rs/q7 jm8Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1765880206; x=1766485006; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=uP2brnCrErMSve8D4fzLeDUYWZS9bjiXvF2HnuazcK4=; b=AqhrQ9SAyuDVR9fICkF3QWGMZzNwQtyN2aZzzOqaCdcnPR4ZTHlv9VDQ6LuN/q8viZ 08U65Gosy7Ij0mRs3WtxachRXaBP6t8yQfCik76BPMuyH5tNLvZ8uryrKq6G0XF3zsVx 1h9a7Zl7pKvMtOHQsLD06BWq7Seo9/RCPcTllRyMoUf/WtDq3mZxaQf1q9maAs+rtDtW 9rjFb26cRLsQ5VRXCeaflazeJdikjDf4Dp8H4Jv+t7RH6vNQjkhNUXIP2dr/5II4W3oP prFmVCZGIXdN4kFBsZajiRSMN/9kgKq0af7tyYMt9TM2x1bqlBHigVDaJWdr5bUKijU5 hwLw== X-Forwarded-Encrypted: i=1; AJvYcCXJtP32rdzWeE7rel7mYOVB1iRxM7rweU4peF3b/HJs/Bp1RV8ran9hlb/bXMZEQSc6lLrQYc+g98CAZgg=@vger.kernel.org X-Gm-Message-State: AOJu0YwQztFqgQqhoQzGgovjuHAEE3fF7+mMCp8wGNBhk7hxK8/eYRqQ YTYzXmj2lTyw58ZP2GOL46df1zOKhok8/zGb6wKkJ9bIwnQH8l6sl2U0e1YMy20tDg0gRgT1FS3 hOfIYfdlX+K2n2w== X-Google-Smtp-Source: AGHT+IE9byNy3arFbMr8XcZNB20Awn6Uqt+GnxA9cDbawxlvEo1C+skvkh+GN9lewQ05aOKuGiox0YHCKpVs8Q== X-Received: from wmsl5.prod.google.com ([2002:a05:600c:1d05:b0:476:ddb0:2391]) (user=jackmanb job=prod-delivery.src-stubby-dispatcher) by 2002:a05:600c:820f:b0:47a:829a:ebb with SMTP id 5b1f17b1804b1-47a8f90656dmr126613995e9.19.1765880205747; Tue, 16 Dec 2025 02:16:45 -0800 (PST) Date: Tue, 16 Dec 2025 10:16:34 +0000 In-Reply-To: <20251216-gcov-inline-noinstr-v3-0-10244d154451@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251216-gcov-inline-noinstr-v3-0-10244d154451@google.com> X-Mailer: b4 0.14.2 Message-ID: <20251216-gcov-inline-noinstr-v3-1-10244d154451@google.com> Subject: [PATCH v3 1/3] kasan: mark !__SANITIZE_ADDRESS__ stubs __always_inline From: Brendan Jackman To: Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Vincenzo Frascino , Marco Elver , Ard Biesheuvel , Andrew Morton , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Nathan Chancellor , Nick Desaulniers , Bill Wendling , Justin Stitt Cc: kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, llvm@lists.linux.dev, Brendan Jackman Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The x86 instrumented bitops in include/asm-generic/bitops/instrumented-non-atomic.h are KASAN-instrumented via explicit calls to instrument_* functions from include/linux/instrumented.h. This bitops are used from noinstr code in __sev_es_nmi_complete(). This code avoids noinstr violations by disabling __SANITIZE_ADDRESS__ etc for the compilation unit. However, when GCOV is enabled, there can still be violations caused by the stub versions of these functions, since coverage instrumentation is injected that causes them to be out-of-lined. Fix this by just applying __always_inline. Signed-off-by: Brendan Jackman Acked-by: Marco Elver --- include/linux/kasan-checks.h | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/include/linux/kasan-checks.h b/include/linux/kasan-checks.h index 3d6d22a25bdc391c0015a6daf2249d6bea752dcb..9aa0f1cc90133ca334afa478b5f= 762aef9e5d79c 100644 --- a/include/linux/kasan-checks.h +++ b/include/linux/kasan-checks.h @@ -37,11 +37,11 @@ static inline bool __kasan_check_write(const volatile v= oid *p, unsigned int size #define kasan_check_read __kasan_check_read #define kasan_check_write __kasan_check_write #else -static inline bool kasan_check_read(const volatile void *p, unsigned int s= ize) +static __always_inline bool kasan_check_read(const volatile void *p, unsig= ned int size) { return true; } -static inline bool kasan_check_write(const volatile void *p, unsigned int = size) +static __always_inline bool kasan_check_write(const volatile void *p, unsi= gned int size) { return true; } --=20 2.50.1 From nobody Fri Dec 19 11:45:26 2025 Received: from mail-wr1-f73.google.com (mail-wr1-f73.google.com [209.85.221.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 618EA319852 for ; Tue, 16 Dec 2025 10:16:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.73 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765880209; cv=none; b=YU1W4+7zUwSzo2PqTW14IBD53A4KlEd7OmhrkrVmsnZmt9mp8oReIChgJEmO7R+jYx3L9/LioMFtqPmUpDf+jEo0e4bsbhv6VrgoPt5rFslLbHJ5X6zB/oG/bFXDGBtFBatWfa31mJ/fulxCJw3MPyvt+eJBWZKjnNaqyZzfMv4= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765880209; c=relaxed/simple; bh=6gLHtvCRjdFJvUPhmnKzmZ6MUckU9lfZ/Xjsh3goSnw=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=gA07MmD4G3zlywg6Sw4vHQnFuYdu3fcJP0IatNDW99pyVTOV+FfolyFWKPyhGq6Q4QUp/mEfZ71oVr7pQpdBrBRrYn1DA7TaMHTNefp72DlKTm/KBdhyWvJ1gGbB/SOaBFo2mn9hMJm1CB31EnrOSoY70LpJEZwDSZKbiPQMWMk= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--jackmanb.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=W0UVfK/h; arc=none smtp.client-ip=209.85.221.73 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--jackmanb.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="W0UVfK/h" Received: by mail-wr1-f73.google.com with SMTP id ffacd0b85a97d-43065ad16a8so1420912f8f.1 for ; Tue, 16 Dec 2025 02:16:48 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1765880207; x=1766485007; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=mIaoUkPmmOJUMbaBzFd5RgQ3q7rdKEgi166V60yfEd4=; b=W0UVfK/hBn8h77Eb3k/jnxt5SMEAUUyIPDNAccpUkwRsAdXV7s3jmQ0SSaQI8H7VlY pjXWAuJmfXlCrT8HG2+5+Qu1xTr1OZpKmib4ExCZCaEMMOhrpafIKjXfZL8XrU+rMs/o fUZDji+n2bOlSW0hLPvdCuvLbMJeCBCCXO5Bb10ZMLPsB3WsDlTCzy8zeCIodXCOSZNI KWg70fD/GzeQDaW00FKlZalPso/oiOpNGgt4hJLcapv/CH/4CDfhAEFyzEDhzJ4SJ+uw t6M8Ahq+Tu6C1X2cGFHMpVBxk1qlPTM0awgPL9OMWhyRFypv3ayoMX7MsIGG41jbt8mk nKOA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1765880207; x=1766485007; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=mIaoUkPmmOJUMbaBzFd5RgQ3q7rdKEgi166V60yfEd4=; b=H0iywTePI3qoy5MluHdaNyZaMbCnD4dNCce5wnMEg1/vSMWr9PfgRj0brOxof658HS 8Je+pUB1slzBVl15D9MD8LmtuiSgsEJ5Pz4ejLejBPtnWvV3qejwSNUq7AIxXTkJeHHR zWsEZaB6P7O8wYQIbDk8HyYICJrcNXnUeJKuWuxtEmAMHLuAOrOtEUvswGrPgfdnzSwM A7I5mxNj+QmUZlRwEcy8UI8t/tg0YU64sdsxE4w9jri9hWkNU4z9/8RRf6f5ujNQzVdJ j6T2+fOPwDlWLbFoTjJZEzWc8b6g74kqA0I3q6krLzhbWrBVqmkRw3k21OQXI9VRQlPy aqOA== X-Forwarded-Encrypted: i=1; AJvYcCXJpD7gpePhBReJfJVjx6pGo6wGdZrtArQCO2TmQh2vVFqUUk0Dhhb3rZuxT59qFQYhLC/6cNlclgtRVqo=@vger.kernel.org X-Gm-Message-State: AOJu0Yxv10jZJ3yY+/PJDLkFMMHlYnALrUOl00JqXzAwC4MwNRdnMVWx eVjwrw9EGDO1nQ2FK9p57z8RwcIf3Lrg//qKZbTiHcLPMcvGcIaU+0QLRugFZk0N/YopFxhl4Mk utDWrBy4hl8h/wQ== X-Google-Smtp-Source: AGHT+IFS5MNBem4cFAx1/02LlUKM4nsKU3vLRTVMVpy1DPCx+drNnY04kUwxrb61WCmz4Bwjhz6dwtKzVbGRYg== X-Received: from wmbhi3.prod.google.com ([2002:a05:600c:5343:b0:477:c551:bdb9]) (user=jackmanb job=prod-delivery.src-stubby-dispatcher) by 2002:a05:600d:6405:20b0:47a:935f:618e with SMTP id 5b1f17b1804b1-47a935f64d7mr109743225e9.15.1765880206873; Tue, 16 Dec 2025 02:16:46 -0800 (PST) Date: Tue, 16 Dec 2025 10:16:35 +0000 In-Reply-To: <20251216-gcov-inline-noinstr-v3-0-10244d154451@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251216-gcov-inline-noinstr-v3-0-10244d154451@google.com> X-Mailer: b4 0.14.2 Message-ID: <20251216-gcov-inline-noinstr-v3-2-10244d154451@google.com> Subject: [PATCH v3 2/3] kcsan: mark !__SANITIZE_THREAD__ stubs __always_inline From: Brendan Jackman To: Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Vincenzo Frascino , Marco Elver , Ard Biesheuvel , Andrew Morton , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Nathan Chancellor , Nick Desaulniers , Bill Wendling , Justin Stitt Cc: kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, llvm@lists.linux.dev, Brendan Jackman Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable The x86 instrumented bitops in include/asm-generic/bitops/instrumented-non-atomic.h are KCSAN-instrumented via explicit calls to instrument_* functions from include/linux/instrumented.h. This bitops are used from noinstr code in __sev_es_nmi_complete(). This code avoids noinstr violations by disabling __SANITIZE_THREAD__ etc for the compilation unit. However, when GCOV is enabled, there can still be violations caused by the stub versions of these functions, since coverage instrumentation is injected that causes them to be out-of-lined. Fix this by just applying __always_inline. Signed-off-by: Brendan Jackman Acked-by: Marco Elver --- include/linux/kcsan-checks.h | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/include/linux/kcsan-checks.h b/include/linux/kcsan-checks.h index 92f3843d9ebb8177432bb4eccc151ea66d3dcbb7..c4c8e03e53459f5030ca33f9103= a9bde49fd3820 100644 --- a/include/linux/kcsan-checks.h +++ b/include/linux/kcsan-checks.h @@ -226,10 +226,10 @@ static inline void kcsan_end_scoped_access(struct kcs= an_scoped_access *sa) { } #define __kcsan_disable_current kcsan_disable_current #define __kcsan_enable_current kcsan_enable_current_nowarn #else /* __SANITIZE_THREAD__ */ -static inline void kcsan_check_access(const volatile void *ptr, size_t siz= e, - int type) { } -static inline void __kcsan_enable_current(void) { } -static inline void __kcsan_disable_current(void) { } +static __always_inline void kcsan_check_access(const volatile void *ptr, + size_t size, int type) { } +static __always_inline void __kcsan_enable_current(void) { } +static __always_inline void __kcsan_disable_current(void) { } #endif /* __SANITIZE_THREAD__ */ =20 #if defined(CONFIG_KCSAN_WEAK_MEMORY) && defined(__SANITIZE_THREAD__) --=20 2.50.1 From nobody Fri Dec 19 11:45:26 2025 Received: from mail-wr1-f73.google.com (mail-wr1-f73.google.com [209.85.221.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 34F032D9798 for ; Tue, 16 Dec 2025 10:16:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.73 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765880211; cv=none; b=HKoMjP9ycTw/Z6D70iFjuqbKC5lWjWU+UP76ZljOBlpQQMJ8aVz1+GVgzirXHJlxjwGCnP7gvF4ln7sXqTuKZARX5ed7LOWq7j2mY+4GoP0J/fMoxl4CpxA+cRrmbtKX4sNk5zveuE0kcCX6vR6YasDQ0H6wYWx51HwTXNQjZiI= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1765880211; c=relaxed/simple; bh=inD0vuzY52gOH2nE9ERpF+9ByKT4ccPlPybBeV0pgH8=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=HCAPyy1eXEKDgFNKZ0ShLi+kpIwOV/HaTUn4X2GqsixMWB73j7wAayOFyMDpRKURT0HzGvWbk7fTCk1C3aAb83F+NjeIlU0SJiPXqOVQttctDae0qJQQf5jgynEgKPAvlagzs+c+PuOKLR1rRqApcPZxpiIWGYq+Jy9AVvyxeN0= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--jackmanb.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=0UIbxD4k; arc=none smtp.client-ip=209.85.221.73 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--jackmanb.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="0UIbxD4k" Received: by mail-wr1-f73.google.com with SMTP id ffacd0b85a97d-43100a07eb1so886948f8f.3 for ; Tue, 16 Dec 2025 02:16:48 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1765880207; x=1766485007; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=eBg82DgwaEqXYt7FN7z5QKnLiVSgwPtdomNA9XrlWso=; b=0UIbxD4kgp/l5A3AIx2lzo2/nwXxnlNG2tXuyPv9fN7wuMbCz7cXe22Q8OKSH3ueOe DO1RqH21Q4iWWaNwWmT1MgMonsOSfSnWfJkQ5/bncyaLhJyg/naPK+Sd0OS53occIijM MnnzthQHNth+hQmzsmnjtVfcIN1CnWDyMmFc5VdGpxUhRWpppXtbHs9ZOhja4wttqCMD cbcVCUqMq0mOp5jY4qBHys03oPEIHYvOvCtJt2ifzHt00syx4w49+V+Z/ODTkLgi9l4+ l1pE/rd0qAThZCDj6b0xRpQBCoJiYSpqa0J3ZIXWOSLRaqYW48zcpXLRKc7x+7yn4gMl zrlw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1765880207; x=1766485007; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=eBg82DgwaEqXYt7FN7z5QKnLiVSgwPtdomNA9XrlWso=; b=XCy/qX3+XlbGw2uBTYbFVXKsRTK5aD6Qj1AVZHipfcgBLx6w9R026mZYsZTz0fseoI K0Dzh7/oUCI4wqsoNxRN7yqQwRGM+HrjSugk1P04GxjNeJ/HGtdsGQMwGWtIT5AhIF11 7k89XGHyZNY+51m/Sn6k3XEHnYAWlfRCisQnV4lHp+rSU7On+rdai5IFcbafYqo4Dza2 e2KxsaINIV4aBxjQvqUEcDMk6gfToGDG7VMjEqpzmvcBAh1iAa9bj8GhK9YimtZP81do bAXJLpJGfGbTZqJkBHp9JfX8RxyPCy4s54dcaupXXcq0ZvLVEVObpn85Hki+kaG+7QA6 34SQ== X-Forwarded-Encrypted: i=1; AJvYcCUpL+/iqPU2upHZfyC+eM8VOwGv67alssRwfHwg6fQRmFn32iG8Jdci6XWNJuvnJXv+SbJtf9YU97iyn/M=@vger.kernel.org X-Gm-Message-State: AOJu0Yyb+pGa0Au+8fG72C8UfdU/3wfAgjinkat/Qcbp1Av5nvgjVBoJ i+WxAg+c80XOQklQl4xnMaCEUSo+EAniY5KLw606pZFtfkMN3WTEUOIneZ2ziV85BXB0FZxm622 PmZ6l9ZOOH/LVOg== X-Google-Smtp-Source: AGHT+IF8tg4ARFUPauM+RrKtcrJYaCoO/GiRg/I5s8E/PwBQR4bK4eIXW9Jg1Q+cB8/UwyWh9QatXY67S1YaaQ== X-Received: from wmbju24.prod.google.com ([2002:a05:600c:56d8:b0:477:7aa2:99cb]) (user=jackmanb job=prod-delivery.src-stubby-dispatcher) by 2002:a05:600d:6405:20b0:47a:935f:618e with SMTP id 5b1f17b1804b1-47a935f64d7mr109743655e9.15.1765880207747; Tue, 16 Dec 2025 02:16:47 -0800 (PST) Date: Tue, 16 Dec 2025 10:16:36 +0000 In-Reply-To: <20251216-gcov-inline-noinstr-v3-0-10244d154451@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251216-gcov-inline-noinstr-v3-0-10244d154451@google.com> X-Mailer: b4 0.14.2 Message-ID: <20251216-gcov-inline-noinstr-v3-3-10244d154451@google.com> Subject: [PATCH v3 3/3] x86/sev: Disable GCOV on noinstr object From: Brendan Jackman To: Andrey Ryabinin , Alexander Potapenko , Andrey Konovalov , Dmitry Vyukov , Vincenzo Frascino , Marco Elver , Ard Biesheuvel , Andrew Morton , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Nathan Chancellor , Nick Desaulniers , Bill Wendling , Justin Stitt Cc: kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, llvm@lists.linux.dev, Brendan Jackman Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable With Debian clang version 19.1.7 (3+build5) there are calls to kasan_check_write() from __sev_es_nmi_complete, which violates noinstr. Fix it by disabling GCOV for the noinstr object, as has been done for previous such instrumentation issues. Note that this file already disables __SANITIZE_ADDRESS__ and __SANITIZE_THREAD__, thus calls like kasan_check_write() ought to be nops regardless of GCOV. This has been fixed in other patches. However, to avoid any other accidental instrumentation showing up, (and since, in principle GCOV is instrumentation and hence should be disabled for noinstr code anyway), disable GCOV overall as well. Signed-off-by: Brendan Jackman Acked-by: Marco Elver --- arch/x86/coco/sev/Makefile | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/coco/sev/Makefile b/arch/x86/coco/sev/Makefile index 3b8ae214a6a64de6bb208eb3b7c8bf12007ccc2c..b2e9ec2f69014fa3507d40c6c26= 6f1b74d634fcb 100644 --- a/arch/x86/coco/sev/Makefile +++ b/arch/x86/coco/sev/Makefile @@ -8,3 +8,5 @@ UBSAN_SANITIZE_noinstr.o :=3D n # GCC may fail to respect __no_sanitize_address or __no_kcsan when inlining KASAN_SANITIZE_noinstr.o :=3D n KCSAN_SANITIZE_noinstr.o :=3D n + +GCOV_PROFILE_noinstr.o :=3D n --=20 2.50.1