lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Sun, 5 Feb 2023 00:06:27 +0800
From:   kernel test robot <lkp@...el.com>
To:     Josh Poimboeuf <jpoimboe@...hat.com>
Cc:     oe-kbuild-all@...ts.linux.dev, linux-kernel@...r.kernel.org,
        Peter Zijlstra <peterz@...radead.org>,
        Miroslav Benes <mbenes@...e.cz>
Subject: vmlinux.o: warning: objtool: vmx_vcpu_enter_exit+0x27: call to
 context_tracking_enabled_this_cpu() leaves .noinstr.text section

Hi Josh,

FYI, the error/warning still remains.

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head:   0136d86b78522bbd5755f8194c97a987f0586ba5
commit: 2bc3dec7055e34c2c2e497f109da6748544c0791 objtool: Don't print parentheses in function addresses
date:   10 months ago
config: x86_64-randconfig-a004-20221128 (https://download.01.org/0day-ci/archive/20230205/202302050019.075FHixH-lkp@intel.com/config)
compiler: gcc-11 (Debian 11.3.0-8) 11.3.0
reproduce (this is a W=1 build):
        # https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2bc3dec7055e34c2c2e497f109da6748544c0791
        git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
        git fetch --no-tags linus master
        git checkout 2bc3dec7055e34c2c2e497f109da6748544c0791
        # save the config file
        mkdir build_dir && cp config build_dir/.config
        make W=1 O=build_dir ARCH=x86_64 olddefconfig
        make W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash

If you fix the issue, kindly add following tag where applicable
| Reported-by: kernel test robot <lkp@...el.com>

All warnings (new ones prefixed by >>):

   ld: warning: arch/x86/lib/retpoline.o: missing .note.GNU-stack section implies executable stack
   ld: NOTE: This behaviour is deprecated and will be removed in a future version of the linker
>> vmlinux.o: warning: objtool: vmx_vcpu_enter_exit+0x27: call to context_tracking_enabled_this_cpu() leaves .noinstr.text section
   vmlinux.o: warning: objtool: enter_from_user_mode+0x4e: call to on_thread_stack() leaves .noinstr.text section
   vmlinux.o: warning: objtool: syscall_enter_from_user_mode+0x57: call to on_thread_stack() leaves .noinstr.text section
   vmlinux.o: warning: objtool: syscall_enter_from_user_mode_prepare+0x4e: call to on_thread_stack() leaves .noinstr.text section
   vmlinux.o: warning: objtool: irqentry_enter_from_user_mode+0x4e: call to on_thread_stack() leaves .noinstr.text section
   ld: warning: vmlinux.o: requires executable stack (because the .note.GNU-stack section is executable)
   ld: warning: .tmp_vmlinux.kallsyms1 has a LOAD segment with RWX permissions
   ld: warning: vmlinux.o: requires executable stack (because the .note.GNU-stack section is executable)
   ld: warning: .tmp_vmlinux.kallsyms2 has a LOAD segment with RWX permissions
   ld: warning: vmlinux.o: requires executable stack (because the .note.GNU-stack section is executable)
   ld: warning: vmlinux has a LOAD segment with RWX permissions


objdump-func vmlinux.o vmx_vcpu_enter_exit:
0000 000000000000030d <vmx_vcpu_enter_exit>:
0000      30d:	55                   	push   %rbp
0001      30e:	48 89 f5             	mov    %rsi,%rbp
0004      311:	53                   	push   %rbx
0005      312:	48 89 fb             	mov    %rdi,%rbx
0008      315:	90                   	nop
0009      316:	e8 00 00 00 00       	call   31b <vmx_vcpu_enter_exit+0xe>	317: R_X86_64_PLT32	trace_hardirqs_on_prepare-0x4
000e      31b:	48 8b 7c 24 10       	mov    0x10(%rsp),%rdi
0013      320:	e8 00 00 00 00       	call   325 <vmx_vcpu_enter_exit+0x18>	321: R_X86_64_PLT32	lockdep_hardirqs_on_prepare-0x4
0018      325:	90                   	nop
0019      326:	66 90                	xchg   %ax,%ax
001b      328:	eb 0a                	jmp    334 <vmx_vcpu_enter_exit+0x27>
001d      32a:	bf 02 00 00 00       	mov    $0x2,%edi
0022      32f:	e8 00 00 00 00       	call   334 <vmx_vcpu_enter_exit+0x27>	330: R_X86_64_PLT32	__context_tracking_enter-0x4
0027      334:	e8 00 00 00 00       	call   339 <vmx_vcpu_enter_exit+0x2c>	335: R_X86_64_PC32	.text+0x151972
002c      339:	84 c0                	test   %al,%al
002e      33b:	75 07                	jne    344 <vmx_vcpu_enter_exit+0x37>
0030      33d:	90                   	nop
0031      33e:	e8 00 00 00 00       	call   343 <vmx_vcpu_enter_exit+0x36>	33f: R_X86_64_PC32	.text+0x15ac9b
0036      343:	90                   	nop
0037      344:	48 8b 7c 24 10       	mov    0x10(%rsp),%rdi
003c      349:	e8 00 00 00 00       	call   34e <vmx_vcpu_enter_exit+0x41>	34a: R_X86_64_PLT32	lockdep_hardirqs_on-0x4
0041      34e:	66 90                	xchg   %ax,%ax
0043      350:	66 90                	xchg   %ax,%ax
0045      352:	eb 11                	jmp    365 <vmx_vcpu_enter_exit+0x58>
0047      354:	48 89 df             	mov    %rbx,%rdi
004a      357:	e8 3b ff ff ff       	call   297 <vmx_l1d_flush>
004f      35c:	eb 07                	jmp    365 <vmx_vcpu_enter_exit+0x58>
0051      35e:	0f 00 2d 00 00 00 00 	verw   0x0(%rip)        # 365 <vmx_vcpu_enter_exit+0x58>	361: R_X86_64_PC32	.rodata+0x42c1c
0058      365:	48 8b 83 78 02 00 00 	mov    0x278(%rbx),%rax
005f      36c:	0f 20 d2             	mov    %cr2,%rdx
0062      36f:	48 39 d0             	cmp    %rdx,%rax
0065      372:	74 03                	je     377 <vmx_vcpu_enter_exit+0x6a>
0067      374:	0f 22 d0             	mov    %rax,%cr2
006a      377:	48 8b 85 60 23 00 00 	mov    0x2360(%rbp),%rax
0071      37e:	48 8d b3 d8 01 00 00 	lea    0x1d8(%rbx),%rsi
0078      385:	48 89 ef             	mov    %rbp,%rdi
007b      388:	0f b6 50 14          	movzbl 0x14(%rax),%edx
007f      38c:	e8 00 00 00 00       	call   391 <vmx_vcpu_enter_exit+0x84>	38d: R_X86_64_PLT32	__vmx_vcpu_run-0x4
0084      391:	88 85 d8 21 00 00    	mov    %al,0x21d8(%rbp)
008a      397:	0f 20 d0             	mov    %cr2,%rax
008d      39a:	48 89 83 78 02 00 00 	mov    %rax,0x278(%rbx)
0094      3a1:	48 8b 7c 24 10       	mov    0x10(%rsp),%rdi
0099      3a6:	e8 00 00 00 00       	call   3ab <vmx_vcpu_enter_exit+0x9e>	3a7: R_X86_64_PLT32	lockdep_hardirqs_off-0x4
009e      3ab:	66 90                	xchg   %ax,%ax
00a0      3ad:	eb 0a                	jmp    3b9 <vmx_vcpu_enter_exit+0xac>
00a2      3af:	bf 02 00 00 00       	mov    $0x2,%edi
00a7      3b4:	e8 00 00 00 00       	call   3b9 <vmx_vcpu_enter_exit+0xac>	3b5: R_X86_64_PLT32	__context_tracking_exit-0x4
00ac      3b9:	90                   	nop
00ad      3ba:	e8 00 00 00 00       	call   3bf <vmx_vcpu_enter_exit+0xb2>	3bb: R_X86_64_PLT32	trace_hardirqs_off_finish-0x4
00b2      3bf:	90                   	nop
00b3      3c0:	5b                   	pop    %rbx
00b4      3c1:	5d                   	pop    %rbp
00b5      3c2:	c3                   	ret

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ