From patchwork Tue May 29 10:36:26 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 137154 Delivered-To: patch@linaro.org Received: by 2002:a2e:9706:0:0:0:0:0 with SMTP id r6-v6csp3875679lji; Tue, 29 May 2018 03:37:12 -0700 (PDT) X-Google-Smtp-Source: AB8JxZr1X3CoLS7q99ayhKAiPNKRfXQ0+1sCRjSvZ/CYjyhvFxT+IHsV1IbBSOCBYVzWErfyPMjg X-Received: by 2002:a17:902:7146:: with SMTP id u6-v6mr16667362plm.289.1527590232807; Tue, 29 May 2018 03:37:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527590232; cv=none; d=google.com; s=arc-20160816; b=XN3IgZKyp6+juvxXIUzyEAcbGDd4kiV4sMf0Zdm4l7JGH+P0CM726jtk/js+xefb1g Xq8tYd5Irtr+Dgo46cxHLrYbKPRNu/OjFF5FSeCmqKUBtuiWnjZOYP9FK6CERVM+YJz1 fTqu0JTEPJrekjsINC6UczcWCd2YyWBotpkGiFABeaEfFEVAVaT8jwf8AyP5PLkotFG7 ZNhmMKmszmjfwE2vaQiF6jWpiPa/1+F7ig5aCgm74B7CyYH5QhEwqwxZA3E/a+PNEn58 BAC1E2x8z5DOVDceVV6GfVmZkTaulG5Kjxtqp9nx5KypFdah3iPupjEJpnJhfNhIDII2 MPbw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=I/5jP7bpYMWYxeMuwEpok3/pkMlM/4L5+M6h0Gq0RfU=; b=JbfD16JV15jZdS+e8Shlem5spm2hcDRMg/ymmsr3XsAyMaUkYSkh0KcIjPq+cFYAeH +Bhs/1Xjepo+Twn2jnpJFQRsZs65hywb0CGHdgDzcgHswK/ghX9g6BEKdBI7YRJzE74W FtNRC+GFJqq/Qy/8kWlKh8RMF36k0qOeAy9ws6zaX2sP9WPrUJjuJq4omqHoN6tYCAEE lcth471wd6xQMY0KHJ0CrGLq08tJLJaJ9yTk/mbAPwd5YIizU9dKzEgF9QLqRWSzOk4y Zk8bCgvnKrXfe1FCAFZo7JUkQJlvCIuYaoP4o5WMgSbtAiDWqw0qWrvnrd2mbD5y4NLq 9mcg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u6-v6si5414366pgb.226.2018.05.29.03.37.07; Tue, 29 May 2018 03:37:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933026AbeE2KhG (ORCPT + 30 others); Tue, 29 May 2018 06:37:06 -0400 Received: from mout.kundenserver.de ([212.227.126.134]:53573 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932975AbeE2Kg5 (ORCPT ); Tue, 29 May 2018 06:36:57 -0400 Received: from wuerfel.lan ([95.208.111.237]) by mrelayeu.kundenserver.de (mreue006 [212.227.15.129]) with ESMTPA (Nemesis) id 0M4P8q-1gFig62qjs-00yduk; Tue, 29 May 2018 12:36:38 +0200 From: Arnd Bergmann To: Russell King Cc: Arnd Bergmann , Dmitry Vyukov , Mark Rutland , Andrew Morton , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH] ARM: disable KCOV for trusted foundations code Date: Tue, 29 May 2018 12:36:26 +0200 Message-Id: <20180529103636.1535457-1-arnd@arndb.de> X-Mailer: git-send-email 2.9.0 X-Provags-ID: V03:K1:iEnb1OoICK5/hTgLy6V+oDRrdtczKmm2HEW89arqfBpUflfiY4H pAz9pN+2L8HGn6doL9H3ouJtYAqwsne4X7ZiWyL0YGOsQYi13uG9d2pCdXMb+AhcyOGtrWl LG+crrWeuR6ixKFbmlEviy92TGC7GtKAtaLLlVdputcv8Nh/xRDpJTo1toqnxcbMZe7hdRf Du3FBTiBE8TdE7VKNxoCg== X-UI-Out-Filterresults: notjunk:1; V01:K0:uQ5VGwqfdMM=:+NV7vtgKSYv1ccVEpnpWBk XRZrH8hsQBDcC18mUTxwa/yzjZDDlgrMN/fTH+YDPTQfXkhJ+CpEELkw8i70vLars1h1pjuYW dr5UaSp7Nq2RiVjSEIIGuJn+zaSmTf6zjQCa6eu8sjThVSlG1vLs6HEumsc0TE5SfTcUi1x5m 1YTAgn99zRPywkPgaeRFLvYGJlv/XcxfeqYiaCkm80NVwa2iz1zQQQVDwxvNhSia8+SFX2oaG tVCA/SMsQjoJ/6JshTa55WS8x8BTgRslvfKxkyx0FhBiHqF5iYdSCL1XNMwprvbEZujZg5PF0 otqttKkGeoGL3624jPGbZIBk0bv2V50MkujFe8WrojXEoTf11J2lC5Fpx2JQWjJD36ygiYNQ+ mIG1gjmlOBytAKWMcCtvj1kjYsBEpN99yWCzvNXGwjAjhNwFzoxAhA6aBTzkl6I4g3VbnDPYa 7EgqnMr45/Mxis67T6Rz6OYUT56H8fj/lESIGLaonTaGlwmGRPXka/PbglWTr0qzCIK1L55Ih nbMLdXslHnLFshLLj1sQQMtEWJmw3E4sOyYkjZVSw8YJ6+UEs/E2Gq7eeP9Xw47YP7nCoV3yL lgcj0hz12XgG4vKc0Y8+Yvgedf6j/hnNfUZc6xwJV5Y2MpNFFmw3AXmjbpywRXSDOUW1MTqUl RGrk3RQrN9jEuH9ivXvcKTRTJaxDxLKBEQEZo9zfuxQsMAoGSMlbmEOHD/r9hAUqhZgc= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The ARM trusted foundations code is currently broken in linux-next when CONFIG_KCOV_INSTRUMENT_ALL is set: /tmp/ccHdQsCI.s: Assembler messages: /tmp/ccHdQsCI.s:37: Error: .err encountered /tmp/ccHdQsCI.s:38: Error: .err encountered /tmp/ccHdQsCI.s:39: Error: .err encountered scripts/Makefile.build:311: recipe for target 'arch/arm/firmware/trusted_foundations.o' failed I could not find a function attribute that lets me disable -fsanitize-coverage=trace-pc for just one function, so this turns it off for the entire file instead. Fixes: mmotm ("arm: port KCOV to arm") Cc: Dmitry Vyukov Cc: Mark Rutland Cc: Andrew Morton Signed-off-by: Arnd Bergmann --- arch/arm/firmware/Makefile | 3 +++ 1 file changed, 3 insertions(+) -- 2.9.0 diff --git a/arch/arm/firmware/Makefile b/arch/arm/firmware/Makefile index a71f16536b6c..6e41336b0bc4 100644 --- a/arch/arm/firmware/Makefile +++ b/arch/arm/firmware/Makefile @@ -1 +1,4 @@ obj-$(CONFIG_TRUSTED_FOUNDATIONS) += trusted_foundations.o + +# tf_generic_smc() fails to build with -fsanitize-coverage=trace-pc +KCOV_INSTRUMENT := n