Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp408769ybk; Fri, 15 May 2020 04:03:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx8Tyr4Bxng4AhuiG+YALHzQw5Dl8jWyER0jfunasVSD/HAO9LCAwtV+6dY/0dyI3puhVnG X-Received: by 2002:a17:906:86d6:: with SMTP id j22mr2144694ejy.1.1589540631511; Fri, 15 May 2020 04:03:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589540631; cv=none; d=google.com; s=arc-20160816; b=JN1WPuDLrjKiUX52nInEBRpVQnt0aqLe5/I2BcOEch3TvF1quQu6Ch83Y19fslf4/C fXEQ1IQDSHcO3ycyVK0tR3PDeX14SldEnA60p4X6k6n6Q//kg/L+4ADlLYadUAYxRLH2 CJhWrPiHDc+9onmYASErKiTa49XfOtsH27cniA9sa/7DRqapqhyYuksWWGLlhPHp+G6r BmXPA6l62ZJ/Q7z5XjftDp5zcbh65401dHBQP+/BKfKweKI/XTq7OkAbYvK9bvYq1pEp JVfuj7BGvwEqSIBz6wEQPmVl9PTZ+uYSF4TD4kyEoAr8bRY4eQV4J3fk6QKtReQ+eZeC EW4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=sW/5ZwfUkcrq8MNsWbZB8lRN7UAKxOnejMG35fACcpU=; b=w0KTaX9G6uHEwfxR2sY4EN3pGe3FgHY25VFgRyNAtMP6f5Mgtx1IAdjGs2/dWOdxhg 56nBth60iAyL3AlUiCluZ5xS1GzbFZWaAQBRAeNg5NAcfBUQk0pZ2VWywi9eCPkaVC1Q asr5js3LtOWrnGtew/IhWzCnH+aUnEtnYe5YSfm4qWw/GsFm37ebsfCAQHEBTJFz2p0Z kc72vYOg99BTtNWovQ015kgnRiysqgf+GgG1Pi2UnQwcnrm6DJM2Psvw76fNDZUlYvSb TT6IqGH2yw0sqsiVu8XkHYKJtX1aX8kpg0wWQRWDyIZaT0ulOdGhYOgVMQQHqJdEvOfK OWhg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="tqre/qi7"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a19si964279eju.155.2020.05.15.04.03.27; Fri, 15 May 2020 04:03:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="tqre/qi7"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726296AbgEOK7b (ORCPT + 99 others); Fri, 15 May 2020 06:59:31 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58040 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726719AbgEOK7W (ORCPT ); Fri, 15 May 2020 06:59:22 -0400 Received: from mail-wr1-x441.google.com (mail-wr1-x441.google.com [IPv6:2a00:1450:4864:20::441]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 29DC3C05BD09 for ; Fri, 15 May 2020 03:59:22 -0700 (PDT) Received: by mail-wr1-x441.google.com with SMTP id i15so2979030wrx.10 for ; Fri, 15 May 2020 03:59:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=sW/5ZwfUkcrq8MNsWbZB8lRN7UAKxOnejMG35fACcpU=; b=tqre/qi7LotrlOupGSzYt/UzPtBy6RKj8xVepwDzpdtgmD2j1I7oQ4kcPPdkV2ZGOJ hkb6qLAW45uzBZeohJSLIXIGRY/7SVGY1leLVFJVuP4CMq9xSsZjxdeS5vfPPIJEl/y4 MHUYKk1DPQdCyvYh7bT9gvsdjIWCHy1cgZBKcG/RbceKT+P2dXPlyzEVONehZKyuPUXL 388pp6M15+gpipCoh7DAoq00mt0q5cZfUMfLfunZYQv4+z9cvbDoEj4JB4JSpO7k2DxO V5ckh4Ftfrl4+RmZy2SzVWEqFvC/U1b7tjmCt7qIYEAU6yVfSEpjBRvfcTtbYrhOj0xo KVHw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=sW/5ZwfUkcrq8MNsWbZB8lRN7UAKxOnejMG35fACcpU=; b=N5pI410ffnDik0Zdrpn5MBESd4MXt12biQXp8lJS/jyfLMj0K4BvbXUKNMihhpAKZP SRfH7C8KDM+OcKUXMaBhIxPaUuoyTqtL/9IF9cD1GveBTxNfdQS+HBjDp875Zr6Nf0JF KxB8k4axWYnD6BlJ9FOgMwyf8/5ArQoAIWEUutMPk28YWnrGyND/YxW6skjYAxzW1R0/ brgBAURzm0JBdmgKWMmYLsUBvNSVd8sC/56PUZTQezmDHfPsA4zFvwMVVM/BBVTQjUGT hhvWmCezqM3Y98H8e4FMwcaqlqfXLF2aACzYlMD+PonyyDutkG4dldDqc0pFLwKj+gAN 4v5g== X-Gm-Message-State: AOAM533YGQjjY45NQFOVaGsUlZYTqo6qJUYKwAxI6IclIvz17jF745nO TscFafsEPjZ7AiKsnH77bRmw0g== X-Received: by 2002:adf:d4c6:: with SMTP id w6mr3816250wrk.92.1589540360508; Fri, 15 May 2020 03:59:20 -0700 (PDT) Received: from localhost ([2a01:4b00:8523:2d03:d11b:f847:8002:7411]) by smtp.gmail.com with ESMTPSA id f128sm3300011wme.1.2020.05.15.03.59.19 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Fri, 15 May 2020 03:59:19 -0700 (PDT) From: David Brazdil To: Catalin Marinas , James Morse , Julien Thierry , Marc Zyngier , Suzuki K Poulose , Will Deacon Cc: kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, David Brazdil Subject: [PATCH v2 14/14] arm64: kvm: Lift instrumentation restrictions on VHE Date: Fri, 15 May 2020 11:58:41 +0100 Message-Id: <20200515105841.73532-15-dbrazdil@google.com> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200515105841.73532-1-dbrazdil@google.com> References: <20200515105841.73532-1-dbrazdil@google.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org With VHE and nVHE executable code completely separated, remove build config that disabled GCOV/KASAN/UBSAN/KCOV instrumentation for VHE as these now execute under the same memory mappings as the rest of the kernel. No violations are currently being reported by either KASAN or UBSAN. Signed-off-by: David Brazdil --- arch/arm64/kvm/hyp/Makefile | 8 -------- 1 file changed, 8 deletions(-) diff --git a/arch/arm64/kvm/hyp/Makefile b/arch/arm64/kvm/hyp/Makefile index c9fd8618980d..69113bf193de 100644 --- a/arch/arm64/kvm/hyp/Makefile +++ b/arch/arm64/kvm/hyp/Makefile @@ -11,11 +11,3 @@ obj-$(CONFIG_KVM_INDIRECT_VECTORS) += smccc_wa.o vhe-y := vgic-v3-sr.o timer-sr.o aarch32.o vgic-v2-cpuif-proxy.o sysreg-sr.o \ debug-sr.o entry.o switch.o fpsimd.o tlb.o hyp-entry.o - -# KVM code is run at a different exception code with a different map, so -# compiler instrumentation that inserts callbacks or checks into the code may -# cause crashes. Just disable it. -GCOV_PROFILE := n -KASAN_SANITIZE := n -UBSAN_SANITIZE := n -KCOV_INSTRUMENT := n -- 2.26.2