Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1441057ybt; Thu, 25 Jun 2020 06:16:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxnNXkQofJaRAu8aDsOojt2hVZbuGBtrmqGfsChpnuBVedqoEYHbrcTjO//E/SiKcrYTqE8 X-Received: by 2002:a17:906:6d4b:: with SMTP id a11mr30821708ejt.108.1593090985329; Thu, 25 Jun 2020 06:16:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593090985; cv=none; d=google.com; s=arc-20160816; b=aCofndvrc2LBkA5LTic+fJWmkb6kjqRyOtKb9TTsqdIF9rFtYCgaH7SfvHwUvWYIJ/ H4YRXGSaZBSeX1Yczz2hz9hdM5lDFszrxuj1iCu+Swzt1wE/LrTYXwV4Pi1SWT/Vvh0Q R9gVQ9RYYcaQJSGUBQX7YARZ9u3kJEiuzV71tiOG1X6DYy3PnFlkxq+GyUTYQU9m/SFg 9sZmjH2zNSLES7lKLYs0qn2QGZJLCwMuYh7ZG1BMu3QqdEh8+ks6sYEuAP/vOaM89IQ4 nHmJT1MlXmk3rmyv0t3JQuOz17QhpjAZlusbDCGyg/4+/XCJEBBYqe3IXx1ec95POVL5 fmXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=weWL7T+4egHpRvm0GYQ+v0Ui4aatvNKJI5SmqJIkJtU=; b=ywjUe5S+uQn5XhjBGn0RI7XjoqJFrlLH6w+p81Yitzf5ubd657eSeOUQterIzI1p50 8fR5JdBlOBuKIVPQSkLR9VnYYlJxV/gsnJTcExyNlanrDs0UYDdfrvueyVc2nyjLanj2 yHRGNJ5Eg0RQIHYE92s+sEcwJxBeFXe/RI+jLXtJ3lSrdUynpoz0+wc3QV4T6y1SUxW5 m/MHGWMAmDwLTdUvsdbSMtZ0JrjaExSB8FoaTj9Ukx4Cmi0pQLmE9WGWeEUPJk0gZYJv 4Z5AGr04QWA7/FpZtRmTtYHkrlGfKEXJ3wj0+r+l91HJlZl+G/6etRNO/xkGIJcyVBKV liTQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=my1fX9ke; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e1si15318193eds.436.2020.06.25.06.16.01; Thu, 25 Jun 2020 06:16:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=my1fX9ke; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405033AbgFYNPN (ORCPT + 99 others); Thu, 25 Jun 2020 09:15:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35120 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404905AbgFYNO4 (ORCPT ); Thu, 25 Jun 2020 09:14:56 -0400 Received: from mail-wr1-x444.google.com (mail-wr1-x444.google.com [IPv6:2a00:1450:4864:20::444]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F404EC08C5DB for ; Thu, 25 Jun 2020 06:14:55 -0700 (PDT) Received: by mail-wr1-x444.google.com with SMTP id f7so2805245wrw.1 for ; Thu, 25 Jun 2020 06:14:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=weWL7T+4egHpRvm0GYQ+v0Ui4aatvNKJI5SmqJIkJtU=; b=my1fX9kephaqvEBX9FIxuU9jSFcVLXtuFzR8EJXTKHAGTj7fLu6Ke5DENPonybea4V PBLUSWSvylaGW+EShdRwCSisN31LtAAQvUK+v/6gqv8mBVJ1AeTUpNtlVDPiOaClm/XB B6VJoXCqxfS2PNF1wy43kOtOAhMEB6m5gpKxVbZmNgH6/c/EoUxQvqJj2qdyXcBbu2bq BTzSiyss5XXgeL8JBFO3zRgUsv+0ufEUH4DA5+wrDD3dcS8DWRGd+VyANE10xSaGBDZB wNxnSbyFFAzJjqYCqVmN445ayuhhkLqksu1gWdfrsThf1TdGUSGBEWgc0w3wslq5X90j wopg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=weWL7T+4egHpRvm0GYQ+v0Ui4aatvNKJI5SmqJIkJtU=; b=QT5O54ZyiBM3Qkoerg8/EnKIEQhgdTDUkrxAZya4RNZeialJQ77uTKjpSnpa4GJ2tT z/S9AlAfOLT5qA7SsyzgqvphaYFS36jeL+qjIfxGiOCz3U8KGhSYmyXCQv9ALr/u7VLr BJocY86jjlUWqiv52NZa6DDz4PwajVI9IElnSh1/HujW1EdjMhaPY9A3G9JJ7HQJsWxO 0evkCoDctZ7bYwpPmE9EFHhk7hBFkon72FwNKtLDyWhb+ToPv9HRiE+uFh3PqbskRtTV uYJiubcXfB08XlqEt5S1j47+AIcYq9f/oaFqne7/NyYxGtEtSn0I2FAGlHVuiocPE47j t6Zg== X-Gm-Message-State: AOAM531Mb4P5Ic19E3xo6lemWJu4HAewQLOUwj22PfaPgX8Zezwt/enD qYlmp72OYLIWFVvkEw1vMs0HxA== X-Received: by 2002:adf:df03:: with SMTP id y3mr34915884wrl.376.1593090894481; Thu, 25 Jun 2020 06:14:54 -0700 (PDT) Received: from localhost ([2a01:4b00:8523:2d03:c126:6748:7a9d:2d]) by smtp.gmail.com with ESMTPSA id z6sm8125973wmf.33.2020.06.25.06.14.53 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 25 Jun 2020 06:14:53 -0700 (PDT) From: David Brazdil To: Marc Zyngier , Will Deacon , Catalin Marinas , James Morse , Julien Thierry , Suzuki K Poulose Cc: kvmarm@lists.cs.columbia.edu, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, android-kvm@google.com, kernel-team@android.com, David Brazdil Subject: [PATCH v4 15/15] arm64: kvm: Lift instrumentation restrictions on VHE Date: Thu, 25 Jun 2020 14:14:20 +0100 Message-Id: <20200625131420.71444-16-dbrazdil@google.com> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200625131420.71444-1-dbrazdil@google.com> References: <20200625131420.71444-1-dbrazdil@google.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org With VHE and nVHE executable code completely separated, remove build config that disabled GCOV/KASAN/UBSAN/KCOV instrumentation for VHE as these now execute under the same memory mappings as the rest of the kernel. No violations are currently being reported by either KASAN or UBSAN. Signed-off-by: David Brazdil --- arch/arm64/kvm/hyp/vhe/Makefile | 8 -------- 1 file changed, 8 deletions(-) diff --git a/arch/arm64/kvm/hyp/vhe/Makefile b/arch/arm64/kvm/hyp/vhe/Makefile index 090fd1e14be2..461e97c375cc 100644 --- a/arch/arm64/kvm/hyp/vhe/Makefile +++ b/arch/arm64/kvm/hyp/vhe/Makefile @@ -9,11 +9,3 @@ ccflags-y := -D__KVM_VHE_HYPERVISOR__ obj-y := timer-sr.o sysreg-sr.o debug-sr.o switch.o tlb.o obj-y += ../vgic-v3-sr.o ../aarch32.o ../vgic-v2-cpuif-proxy.o ../entry.o \ ../fpsimd.o ../hyp-entry.o - -# KVM code is run at a different exception code with a different map, so -# compiler instrumentation that inserts callbacks or checks into the code may -# cause crashes. Just disable it. -GCOV_PROFILE := n -KASAN_SANITIZE := n -UBSAN_SANITIZE := n -KCOV_INSTRUMENT := n -- 2.27.0