From patchwork Sat Jun 30 18:12:10 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Andrew Morton X-Patchwork-Id: 10498365 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 05A5B602BF for ; Sat, 30 Jun 2018 18:12:17 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id E75BC28F8A for ; Sat, 30 Jun 2018 18:12:16 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id DBC5E28F8C; Sat, 30 Jun 2018 18:12:16 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.9 required=2.0 tests=BAYES_00, MAILING_LIST_MULTI, RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 5E3CD28F8B for ; Sat, 30 Jun 2018 18:12:16 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 54BDB6B0006; Sat, 30 Jun 2018 14:12:15 -0400 (EDT) Delivered-To: linux-mm-outgoing@kvack.org Received: by kanga.kvack.org (Postfix, from userid 40) id 4FC156B0007; Sat, 30 Jun 2018 14:12:15 -0400 (EDT) X-Original-To: int-list-linux-mm@kvack.org X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 4124C6B0008; Sat, 30 Jun 2018 14:12:15 -0400 (EDT) X-Original-To: linux-mm@kvack.org X-Delivered-To: linux-mm@kvack.org Received: from mail-pl0-f72.google.com (mail-pl0-f72.google.com [209.85.160.72]) by kanga.kvack.org (Postfix) with ESMTP id 00D4E6B0006 for ; Sat, 30 Jun 2018 14:12:14 -0400 (EDT) Received: by mail-pl0-f72.google.com with SMTP id 31-v6so7049599plf.19 for ; Sat, 30 Jun 2018 11:12:14 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-original-authentication-results:x-gm-message-state:date:from:to :subject:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=j6G7vfKSJXthXuqgEuQONB+DAVre5Nx+JOxzWp4AU1E=; b=GqSMB8XTbVnT190BJR+UXg+sJMDkRIjqV4w5k0GOw/eiobLhPlUH7RSKO16rTlPBd0 kOBFkNJ89bqGFWV3N+JGezNK/qZ853AXj/sOsJmPyW9VZBqyD2rqu1Tv6u8AKJL/e3TR XxO2pG3Dv7BF26NfNcuzntpNwXSRSxaS2sP6ZCzp+83xZ0PoaMl7Yox0wdS/lmjxXbJH 2vSYADi8eqQ7G15FwafYBPTub00KJukMs67uRYQN2/OVyB/flJMAwhaunamtUTBZzB/i FQ8kNIrDhLMudow/bSMY4aFtVBG81pXD2CVNIANY4m4jOKsaA+GmjbiEZAUfinu5XXSE 4saw== X-Original-Authentication-Results: mx.google.com; spf=pass (google.com: domain of akpm@linux-foundation.org designates 140.211.169.12 as permitted sender) smtp.mailfrom=akpm@linux-foundation.org X-Gm-Message-State: APt69E2ajffgvrmxu70psNp2zrcV6SUUFDliV3OYZxoS33AsykLlpHJk XoWLVrCZ9U2UsxUSQLkkv+6hfM2d+NnuMW5+wGIhvCqn1HckFW6g6jDZ4DTFE8WWzbnXYov22Bz U2oqxBWT1hzqEeDBMAn/HdNOy7rdib51CwgbMPh2vemouwp7Y07UDAW7WZF5do3be+w== X-Received: by 2002:a17:902:8a95:: with SMTP id p21-v6mr19569083plo.91.1530382334647; Sat, 30 Jun 2018 11:12:14 -0700 (PDT) X-Google-Smtp-Source: ADUXVKI741kbDRtSZZ4HH/trg+epjZK98HX4KQyNcY9Smfexgf4/wnS94shviyR7iluw9cDkBVpJ X-Received: by 2002:a17:902:8a95:: with SMTP id p21-v6mr19569051plo.91.1530382333798; Sat, 30 Jun 2018 11:12:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530382333; cv=none; d=google.com; s=arc-20160816; b=DO+MyhGTiQDMuLPS9TWApdGxUCe8OnG78uJmsh/7JwevIn2JmZgXnmGL1HuQEYusE2 bjcrq9MJ1hb85MXGP7QseIbNX5Y3SlfxnYHFd09KB6oDtruZyXxTARoVWFszWsx6Db9+ 2pGiJr6ZxH9xY50i9Sl3Qc1Z6u9AtL28ZS08K2MOHw/fZRKuja+9Xtb9VAtOXEFb8HBz Dz6dQJqPOnU+E9iPMiRZWtk1cxsrOFaJxvlhm7j+ScMjF4HiNEbCRalUPLU6y21wszsS KtoorxiSkVbn8oTuFjv9YaAX7WvxO7w7SXzf84g0fQlfaokVpIZsEGSx79Sx38x51OQg y+UA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:subject:to:from:date:arc-authentication-results; bh=j6G7vfKSJXthXuqgEuQONB+DAVre5Nx+JOxzWp4AU1E=; b=QeD2LOm95cn/YuEaLcw6P1mLZsQ2luqBZfORc9Y+A9jLYaefb8fSMcEtLrlw/vL9OW aMWbgAhFX5XAmgq/2Y/BJBBUhR5Dfhwn/vKv9fGV+HzCtzy1m65mgJS/djgRbjgao5Hd 6XkvyyPVPBi7pqwTlbnW3NqcFfWPT6A6SViKq92prQ1ftt/UMHWxTDShokvKYDL2YQjV aGA5M4YAwBkcibErxTjTRwmVJaczr3gixhmO8A7k+YfIxeHxowIMM5zXZ1TwkxnSLJMV 2yDWSkJ03aNm7z10QJ2LERwzmow+q/xN3EBQKB4bDSbZhnINGtKgOYZoIXPX9fwYykpX z5og== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of akpm@linux-foundation.org designates 140.211.169.12 as permitted sender) smtp.mailfrom=akpm@linux-foundation.org Received: from mail.linuxfoundation.org (mail.linuxfoundation.org. [140.211.169.12]) by mx.google.com with ESMTPS id z6-v6si10945592pgo.364.2018.06.30.11.12.13 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 30 Jun 2018 11:12:13 -0700 (PDT) Received-SPF: pass (google.com: domain of akpm@linux-foundation.org designates 140.211.169.12 as permitted sender) client-ip=140.211.169.12; Authentication-Results: mx.google.com; spf=pass (google.com: domain of akpm@linux-foundation.org designates 140.211.169.12 as permitted sender) smtp.mailfrom=akpm@linux-foundation.org Received: from localhost.localdomain (c-24-4-125-7.hsd1.ca.comcast.net [24.4.125.7]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 086518B1; Sat, 30 Jun 2018 18:12:12 +0000 (UTC) Date: Sat, 30 Jun 2018 11:12:10 -0700 From: Andrew Morton To: Dmitry Vyukov , kbuild test robot , kbuild-all@01.org, LKML , Linux Memory Management List Subject: Re: /tmp/cctnQ1CM.s:35: Error: .err encountered Message-Id: <20180630111210.ec9de2c2923a0c58b1357965@linux-foundation.org> In-Reply-To: <20180630110720.c80f060abe6d163eef78e9a6@linux-foundation.org> References: <201806301538.bewm1wka%fengguang.wu@intel.com> <20180630110720.c80f060abe6d163eef78e9a6@linux-foundation.org> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: X-Virus-Scanned: ClamAV using ClamSMTP On Sat, 30 Jun 2018 11:07:20 -0700 Andrew Morton wrote: > On Sat, 30 Jun 2018 12:27:09 +0200 Dmitry Vyukov wrote: > > > > tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master > > > head: 1904148a361a07fb2d7cba1261d1d2c2f33c8d2e > > > commit: 758517202bd2e427664857c9f2aa59da36848aca arm: port KCOV to arm > > > date: 2 weeks ago > > > config: arm-allmodconfig (attached as .config) > > > compiler: arm-linux-gnueabi-gcc (Debian 7.2.0-11) 7.2.0 > > > reproduce: > > > wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross > > > chmod +x ~/bin/make.cross > > > git checkout 758517202bd2e427664857c9f2aa59da36848aca > > > # save the attached .config to linux build tree > > > GCC_VERSION=7.2.0 make.cross ARCH=arm > > > > > > All errors (new ones prefixed by >>): > > > > > > /tmp/cctnQ1CM.s: Assembler messages: > > >>> /tmp/cctnQ1CM.s:35: Error: .err encountered > > > /tmp/cctnQ1CM.s:36: Error: .err encountered > > > /tmp/cctnQ1CM.s:37: Error: .err encountered > > > > Hi kbuild test robot, > > > > The fix was mailed more than a month ago, but still not merged into > > the tree. That's linux... > > That was a rather unhelpful email. > > I've just scanned all your lkml emails since the start of May and > cannot find anything which looks like a fix for this issue. > > Please resend. About three weks ago :( OK, with a bi of amazing sleuthing I found this from Arnd, which is what I presume you're referring to? From: Arnd Bergmann Subject: ARM: disable KCOV for trusted foundations code The ARM trusted foundations code is currently broken in linux-next when CONFIG_KCOV_INSTRUMENT_ALL is set: /tmp/ccHdQsCI.s: Assembler messages: /tmp/ccHdQsCI.s:37: Error: .err encountered /tmp/ccHdQsCI.s:38: Error: .err encountered /tmp/ccHdQsCI.s:39: Error: .err encountered scripts/Makefile.build:311: recipe for target 'arch/arm/firmware/trusted_foundations.o' failed I could not find a function attribute that lets me disable -fsanitize-coverage=trace-pc for just one function, so this turns it off for the entire file instead. Link: http://lkml.kernel.org/r/20180529103636.1535457-1-arnd@arndb.de Fixes: 758517202bd2e4 ("arm: port KCOV to arm") Signed-off-by: Arnd Bergmann Cc: Dmitry Vyukov Cc: Mark Rutland Signed-off-by: Andrew Morton Acked-by: Olof Johansson diff -puN arch/arm/firmware/Makefile~arm-disable-kcov-for-trusted-foundations-code arch/arm/firmware/Makefile --- a/arch/arm/firmware/Makefile~arm-disable-kcov-for-trusted-foundations-code +++ a/arch/arm/firmware/Makefile @@ -1 +1,4 @@ obj-$(CONFIG_TRUSTED_FOUNDATIONS) += trusted_foundations.o + +# tf_generic_smc() fails to build with -fsanitize-coverage=trace-pc +KCOV_INSTRUMENT := n