[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <176760643216.510.5051258374257648101.tip-bot2@tip-bot2>
Date: Mon, 05 Jan 2026 09:47:12 -0000
From: "tip-bot2 for Brendan Jackman" <tip-bot2@...utronix.de>
To: linux-tip-commits@...r.kernel.org
Cc: Brendan Jackman <jackmanb@...gle.com>,
"Borislav Petkov (AMD)" <bp@...en8.de>, Marco Elver <elver@...gle.com>,
x86@...nel.org, linux-kernel@...r.kernel.org
Subject: [tip: x86/urgent] x86/sev: Disable GCOV on noinstr object
The following commit has been merged into the x86/urgent branch of tip:
Commit-ID: 9efb74f84ba82a9de81fc921baf3c5e2decf8256
Gitweb: https://git.kernel.org/tip/9efb74f84ba82a9de81fc921baf3c5e2decf8256
Author: Brendan Jackman <jackmanb@...gle.com>
AuthorDate: Tue, 16 Dec 2025 10:16:36
Committer: Borislav Petkov (AMD) <bp@...en8.de>
CommitterDate: Mon, 05 Jan 2026 10:22:48 +01:00
x86/sev: Disable GCOV on noinstr object
With Debian clang version 19.1.7 (3+build5) there are calls to
kasan_check_write() from __sev_es_nmi_complete(), which violates noinstr. Fix
it by disabling GCOV for the noinstr object, as has been done for previous
such instrumentation issues.
Note that this file already disables __SANITIZE_ADDRESS__ and
__SANITIZE_THREAD__, thus calls like kasan_check_write() ought to be nops
regardless of GCOV. This has been fixed in other patches. However, to avoid
any other accidental instrumentation showing up, (and since, in principle GCOV
is instrumentation and hence should be disabled for noinstr code anyway),
disable GCOV overall as well.
Signed-off-by: Brendan Jackman <jackmanb@...gle.com>
Signed-off-by: Borislav Petkov (AMD) <bp@...en8.de>
Acked-by: Marco Elver <elver@...gle.com>
Link: https://patch.msgid.link/20251216-gcov-inline-noinstr-v3-3-10244d154451@google.com
---
arch/x86/coco/sev/Makefile | 2 ++
1 file changed, 2 insertions(+)
diff --git a/arch/x86/coco/sev/Makefile b/arch/x86/coco/sev/Makefile
index 3b8ae21..b2e9ec2 100644
--- a/arch/x86/coco/sev/Makefile
+++ b/arch/x86/coco/sev/Makefile
@@ -8,3 +8,5 @@ UBSAN_SANITIZE_noinstr.o := n
# GCC may fail to respect __no_sanitize_address or __no_kcsan when inlining
KASAN_SANITIZE_noinstr.o := n
KCSAN_SANITIZE_noinstr.o := n
+
+GCOV_PROFILE_noinstr.o := n
Powered by blists - more mailing lists