This is due to using gcc-10.2. Building with gcc-9 is fine. This
compiler support for GCOV will be disabled, see
https://lkml.org/lkml/2020/9/2/934

So, marking this as Won't Fix because there is a workaround and 10.2 is
not looking favourably for GCOV support at the moment.

** Changed in: linux (Ubuntu)
       Status: In Progress => Won't Fix

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1891288

Title:
  arm64 gcov in 5.8 breaks when trying to enable it

Status in Linux:
  Confirmed
Status in linux package in Ubuntu:
  Won't Fix

Bug description:
  Running:

  sudo lcov --zerocounters on a gcov enabled kernel causes a read-only
  splat:

  
  [  139.798968] Unable to handle kernel write to read-only memory at virtual 
address ffffb4511ee6bb10
  [  139.803325] Mem abort info:
  [  139.804882]   ESR = 0x9600004e
  [  139.806265]   EC = 0x25: DABT (current EL), IL = 32 bits
  [  139.811261]   SET = 0, FnV = 0
  [  139.814163]   EA = 0, S1PTW = 0
  [  139.816545] Data abort info:
  [  139.817852]   ISV = 0, ISS = 0x0000004e
  [  139.820023]   CM = 0, WnR = 1
  [  139.821350] swapper pgtable: 4k pages, 48-bit VAs, pgdp=000000005086f000
  [  139.825005] [ffffb4511ee6bb10] pgd=00000001b6fff003, p4d=00000001b6fff003, 
pud=00000001b6ffe003, pmd=004000004e200f91
  [  139.832061] Internal error: Oops: 9600004e [#1] SMP
  [  139.835002] Modules linked in: nls_iso8859_1 dm_multipath scsi_dh_rdac 
scsi_dh_emc scsi_dh_alua efi_pstore qemu_fw_cfg sch_fq_codel drm virtio_rng ip_t
  ables x_tables autofs4 btrfs blake2b_generic raid10 raid456 async_raid6_recov 
async_memcpy async_pq async_xor async_tx xor xor_neon raid6_pq libcrc32c rai
  d1 raid0 multipath linear crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce 
virtio_net net_failover xhci_pci virtio_blk virtio_scsi failover xhci_pci_ren
  esas aes_neon_bs aes_neon_blk aes_ce_blk crypto_simd cryptd aes_ce_cipher
  [  139.865929] CPU: 5 PID: 1235 Comm: lcov Tainted: G        W         
5.8.0-8-generic #9
  [  139.871293] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
  [  139.876248] pstate: 20400005 (nzCv daif +PAN -UAO BTYPE=--)
  [  139.879993] pc : __memset+0x148/0x188
  [  139.882387] lr : gcov_info_reset+0xa0/0x110
  [  139.885404] sp : ffff8000122f3bf0
  [  139.887730] x29: ffff8000122f3bf0 x28: ffff000167480f40
  [  139.891129] x27: 0000000000000000 x26: ffffb450e46bc060
  [  139.894688] x25: 0000000000000001 x24: ffffb450e46bc040
  [  139.897391] x23: 0000000000000000 x22: ffffb450e46bc0a8
  [  139.900064] x21: ffffb45122ba5db8 x20: ffffb450e46bc068
  [  139.902681] x19: ffffb450e46bc068 x18: 0000000000000000
  [  139.905345] x17: 0000000000000000 x16: 0000000000000000
  [  139.908016] x15: 0000000000000000 x14: 0000000000000000
  [  139.910625] x13: 0000000000000000 x12: 0000000000000000
  [  139.913260] x11: 0000000000000000 x10: 0000000000000000
  [  139.915922] x9 : 0000000000000000 x8 : ffffb4511ee6bb10
  [  139.918531] x7 : 0000000000000000 x6 : 000000000000003f
  [  139.921196] x5 : 0000000000000040 x4 : 0000000000000030
  [  139.923852] x3 : 00000007235d7fd0 x2 : 00000007235d7fd0
  [  139.926460] x1 : 0000000000000000 x0 : ffffb4511ee6bb10
  [  139.929126] Call trace:
  [  139.930349]  __memset+0x148/0x188
  [  139.932025]  reset_node+0x70/0xc0
  [  139.933662]  reset_write+0xc0/0x130
  [  139.935389]  full_proxy_write+0x98/0x110
  [  139.937349]  vfs_write+0x18c/0x3e0
  [  139.939031]  ksys_write+0xc4/0x1f0
  [  139.940766]  __arm64_sys_write+0x44/0x60
  [  139.942705]  invoke_syscall+0x74/0x150
  [  139.944601]  el0_svc_common.constprop.0+0x94/0x264
  [  139.946961]  do_el0_svc+0x5c/0x7c
  [  139.948651]  el0_svc+0x70/0x114
  [  139.950206]  el0_sync_handler+0x140/0x39c
  [  139.952239]  el0_sync+0x17c/0x180
  [  139.953894] Code: f101007f fa45a068 54fffc0b aa0303e2 (a9001d07)
  [  139.956946] ---[ end trace 71e2f9cc3eaddf4e ]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1891288/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to