Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp3509065pxb; Mon, 4 Apr 2022 19:16:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz428eLGVWLKcKLweXkAPrnkkprWnuKebdj/rbHhxNWlJReuCW5DMTaV+q48p4VbUic6mGj X-Received: by 2002:a17:90b:789:b0:1bc:293c:1445 with SMTP id l9-20020a17090b078900b001bc293c1445mr1416691pjz.111.1649124977548; Mon, 04 Apr 2022 19:16:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649124977; cv=none; d=google.com; s=arc-20160816; b=fScwwBuA3KUZr9USuRbqiEOiC+pacWzjGyLThH7wGsfOdwyr8bMozCgKObV0UG1jc0 i/hcgbyXOymEpj3FuDWD5N0TUHq8oT+vtNsbzhoS6+9v48l4cXe/0lg1JlajD7zv1S/b qGJ5+pL3HIC821T/u1cfKCTkl4Q1NVcfHYU1xkvRja2asfAnYvEEyIAuFzAYwKDmh35X fhGAk0iK11JoYDugLRGByv0i4G9C8neVyqixUH3i2gQTmRzRZCqRFhGQaq9c1iqO1tK+ wnn+dqdacqA4HCHaZwQEjyqO2M2+qU8hs7TCNBOm6E+sCV+KR/XbwkHludm+SpM5zwjr qOAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=ljVFJ91CIcacxYCCnA7VyXXgQ/UqtPem7/iHfwWOkgU=; b=tUoQSWw/QzY4M848tekKgnjqmcIZhQw4tFSMWomyhYwAlNHEgUIB/TSS9nZtDznGBA 6sUqI43YsJ+6SyuJS6NrziMLpJGd40eZ+8Btb8N228d6jeL6wpICNmfUTReRR0NAqNTj Y22Q1NYkHjsxFXxkumiOLQ0Cl+Oa89EBr1m1tK6Lm/Sa3TC56CEJUySvlgcCK7n8zMKp UbSD1SSVV0syrvc4CvFpENYsno24V4u3kOdW0oh3nZvwasvkYYCgyYb8EMv1xiDrynMY iyEEfYj+nolQvA/Ksj4e10pck4n38unJBlTTSfZl8QIDmjPHsLer2kWFvZEkFZ21jS6V tLFA== ARC-Authentication-Results: i=1; mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id w2-20020a170902e88200b00153b2d1654csi12472786plg.340.2022.04.04.19.16.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Apr 2022 19:16:17 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 0BF50281837; Mon, 4 Apr 2022 17:38:24 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1379877AbiDDVrl (ORCPT + 99 others); Mon, 4 Apr 2022 17:47:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37756 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1380275AbiDDT1D (ORCPT ); Mon, 4 Apr 2022 15:27:03 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F137926AD7 for ; Mon, 4 Apr 2022 12:25:05 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 6B1CC60DFF for ; Mon, 4 Apr 2022 19:25:05 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 267E1C2BBE4; Mon, 4 Apr 2022 19:25:04 +0000 (UTC) Date: Mon, 4 Apr 2022 15:25:02 -0400 From: Steven Rostedt To: Kees Cook Cc: Josh Poimboeuf , Peter Zijlstra , kbuild-all@lists.01.org, linux-kernel@vger.kernel.org, kernel test robot Subject: Re: vmlinux.o: warning: objtool: stackleak_erase()+0x35: call to ftrace_likely_update() leaves .noinstr.text section Message-ID: <20220404152502.0621caf9@gandalf.local.home> In-Reply-To: <202204041125.500C28FD8@keescook> References: <202204042008.sCQbEmVS-lkp@intel.com> <202204041125.500C28FD8@keescook> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 4 Apr 2022 11:27:47 -0700 Kees Cook wrote: > I got CCed on this because of stackleak_erase() triggering, this, but it > appears to be an existing issue for other callers too. It looks like > __branch_check__() shouldn't be emitting ftrace_likely_update() calls > for noinstr functions... > > I have no idea how a macro is meant to check for function attributes, > though... :( Ignore it. It's the branch tracer enabled (that is, every "if ()" is being traced). Although I still use the branch profiler, I do not believe anyone uses the branch tracer. The branch profiler updates an array of counters that tells when the branch was true or false, the branch tracer actually traces (records an event) for every branch in the system! I think I'll just send a patch to nuke the tracer. I'm sure Peter Zijlstra will be happy when I do that. But I still want the profiler, as I find that useful. -- Steve