From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.3 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C6A1EC2B9F7 for ; Wed, 26 May 2021 08:13:15 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 9AAD9613CD for ; Wed, 26 May 2021 08:13:15 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232431AbhEZIOp (ORCPT ); Wed, 26 May 2021 04:14:45 -0400 Received: from mga11.intel.com ([192.55.52.93]:15164 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231410AbhEZIOo (ORCPT ); Wed, 26 May 2021 04:14:44 -0400 IronPort-SDR: hFYgFMg+XGPVlIpw3GfnBeoli4+Y+mJwOkyZ3KA99sdXW6RWvuFTIqCXRtcolKebGDmcSzXHBG SPoaDB6Lcr3w== X-IronPort-AV: E=McAfee;i="6200,9189,9995"; a="199356802" X-IronPort-AV: E=Sophos;i="5.82,330,1613462400"; d="scan'208";a="199356802" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 May 2021 01:13:09 -0700 IronPort-SDR: zr2kQKDzF9wdSZcCuhXI6/J+hEJWyKn4o5NLKO9pSytsxONkOdzjZEqbcjDkhpK5pxypxVDco9 IYGranyz7VuQ== X-IronPort-AV: E=Sophos;i="5.82,330,1613462400"; d="scan'208";a="476823976" Received: from shao2-debian.sh.intel.com (HELO [10.239.13.11]) ([10.239.13.11]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 May 2021 01:13:05 -0700 Subject: Re: [kbuild-all] Re: [PATCH] kcov: add __no_sanitize_coverage to fix noinstr for all architectures To: Marco Elver , kernel test robot Cc: kbuild-all@lists.01.org, clang-built-linux , LKML , Nathan Chancellor , Nick Desaulniers , Miguel Ojeda , Kees Cook , Andrew Morton , Will Deacon , Ard Biesheuvel , Luc Van Oostenryck References: <20210525175819.699786-1-elver@google.com> <202105260629.X6n5yc4D-lkp@intel.com> From: Rong Chen Message-ID: Date: Wed, 26 May 2021 16:11:50 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/26/21 6:29 AM, Marco Elver wrote: > On Wed, 26 May 2021 at 00:23, kernel test robot wrote: > [...] >> [auto build test WARNING on linux/master] >> [also build test WARNING on kees/for-next/pstore linus/master v5.13-rc3 next-20210525] >> [If your patch is applied to the wrong git tree, kindly drop us a note. >> And when submitting patch, we suggest to use '--base' as documented in >> https://git-scm.com/docs/git-format-patch] >> >> url: https://github.com/0day-ci/linux/commits/Marco-Elver/kcov-add-__no_sanitize_coverage-to-fix-noinstr-for-all-architectures/20210526-020046 >> base: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git dd860052c99b1e088352bdd4fb7aef46f8d2ef47 >> config: s390-randconfig-r002-20210525 (attached as .config) >> compiler: clang version 13.0.0 (https://github.com/llvm/llvm-project 99155e913e9bad5f7f8a247f8bb3a3ff3da74af1) > ^^^ you're using a Clang pre-release, breakages are expected until > Clang 13 is final. Hi Marco, I really appreciate for your comment, we'll update clang to the latest version. Best Regards, Rong Chen > > I think there was a thread about this at some point. I guess LKP has > decided that testing Clang pre-releases is fair game? I guess it's > useful, but this warning here needs to be ignored. It'll go away when > you rebuild your pre-release Clang 13 from the latest LLVM main > branch. > > [...] >>>> arch/s390/kernel/nmi.c:182:6: warning: unknown sanitizer 'coverage' ignored [-Wunknown-sanitizers] >> void noinstr s390_handle_mcck(void) >> ^ >> include/linux/compiler_types.h:213:35: note: expanded from macro 'noinstr' >> __no_kcsan __no_sanitize_address __no_sanitize_coverage >> ^ >> include/linux/compiler-clang.h:49:59: note: expanded from macro '__no_sanitize_coverage' >> #define __no_sanitize_coverage __attribute__((no_sanitize("coverage"))) >> ^ > Clang 13 will support the attribute, but this is a pre-release Clang > 13 -- so please ignore the report. FWIW, I tested my patch of course > with a version of Clang 13 that supports the attribute. :-) > > Thanks, > -- Marco > _______________________________________________ > kbuild-all mailing list -- kbuild-all@lists.01.org > To unsubscribe send an email to kbuild-all-leave@lists.01.org From mboxrd@z Thu Jan 1 00:00:00 1970 Content-Type: multipart/mixed; boundary="===============1055668285495837071==" MIME-Version: 1.0 From: Rong Chen To: kbuild-all@lists.01.org Subject: Re: [PATCH] kcov: add __no_sanitize_coverage to fix noinstr for all architectures Date: Wed, 26 May 2021 16:11:50 +0800 Message-ID: In-Reply-To: List-Id: --===============1055668285495837071== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable On 5/26/21 6:29 AM, Marco Elver wrote: > On Wed, 26 May 2021 at 00:23, kernel test robot wrote: > [...] >> [auto build test WARNING on linux/master] >> [also build test WARNING on kees/for-next/pstore linus/master v5.13-rc3 = next-20210525] >> [If your patch is applied to the wrong git tree, kindly drop us a note. >> And when submitting patch, we suggest to use '--base' as documented in >> https://git-scm.com/docs/git-format-patch] >> >> url: https://github.com/0day-ci/linux/commits/Marco-Elver/kcov-add-__= no_sanitize_coverage-to-fix-noinstr-for-all-architectures/20210526-020046 >> base: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.g= it dd860052c99b1e088352bdd4fb7aef46f8d2ef47 >> config: s390-randconfig-r002-20210525 (attached as .config) >> compiler: clang version 13.0.0 (https://github.com/llvm/llvm-project 991= 55e913e9bad5f7f8a247f8bb3a3ff3da74af1) > ^^^ you're using a Clang pre-release, breakages are expected until > Clang 13 is final. Hi Marco, I really appreciate for your comment, we'll update clang to the latest = version. Best Regards, Rong Chen > > I think there was a thread about this at some point. I guess LKP has > decided that testing Clang pre-releases is fair game? I guess it's > useful, but this warning here needs to be ignored. It'll go away when > you rebuild your pre-release Clang 13 from the latest LLVM main > branch. > > [...] >>>> arch/s390/kernel/nmi.c:182:6: warning: unknown sanitizer 'coverage' ig= nored [-Wunknown-sanitizers] >> void noinstr s390_handle_mcck(void) >> ^ >> include/linux/compiler_types.h:213:35: note: expanded from macro 'no= instr' >> __no_kcsan __no_sanitize_address __no_sanitize_coverage >> ^ >> include/linux/compiler-clang.h:49:59: note: expanded from macro '__n= o_sanitize_coverage' >> #define __no_sanitize_coverage __attribute__((no_sanitize("coverage"= ))) >> ^ > Clang 13 will support the attribute, but this is a pre-release Clang > 13 -- so please ignore the report. FWIW, I tested my patch of course > with a version of Clang 13 that supports the attribute. :-) > > Thanks, > -- Marco > _______________________________________________ > kbuild-all mailing list -- kbuild-all(a)lists.01.org > To unsubscribe send an email to kbuild-all-leave(a)lists.01.org --===============1055668285495837071==--