Received: by 2002:a05:6358:701b:b0:131:369:b2a3 with SMTP id 27csp402035rwo; Fri, 21 Jul 2023 13:53:27 -0700 (PDT) X-Google-Smtp-Source: APBJJlHqUl8aXiHAUM07T+w3+8LDKYBNSO8wSFCB3ja8bmjKL8+0ZtwH4T4u1pp5ZcUaaxV+FLME X-Received: by 2002:aa7:d34b:0:b0:51e:3cc5:e036 with SMTP id m11-20020aa7d34b000000b0051e3cc5e036mr2442318edr.18.1689972807311; Fri, 21 Jul 2023 13:53:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689972807; cv=none; d=google.com; s=arc-20160816; b=U3MnaLX+YxA7CX4Ui9X3gCeNOrG0bxh/2S8Ccb2pfkKpI0Wgu33LCQpaJ7jPvYU2sA wifk/91b9f0rBrY8cTtF/wJlqDfwqxSDvSHp6B0U8ORpxLjoJvQqV8p27Lw32CQP4Ih1 a1/olR82mv9nVvB0znSXm8p7HBlAkbUZ/KwJLiNq8jhXOgouJMbhaZGx8nHJN2X/PDTM oONaPFinRIdYzHD/ln+kUnLJUmH0AqegUXxbsBqq9baYUkd4+UoZopNtSZB7otDRd8um aPTFAeFO7IffbAF1ruNH9dWXK2jFRr9TAH3ZmkXsn5zvff55y1hSzmxCyBLj8W3FOudI Lp+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=E35DjpYr9gROpy8AJKVNxGNFgg9Z8dt+RR13pq2liPE=; fh=sG4Q/sFp8ZiEZuPor2UReVqedVbFKF+sKiPuIb0va4U=; b=DT4Iu18OiklvtnwbeHib9qPxXfTMEsBQGSj6lug3HimVfaiingYWHA6hMU3Wdehp5p BdIkZwwbW9wxn25LAZXrqfDGNbmsrbJsqWV1B1oArEB4ap6G0HXbrRTnEBPED1sbuiIM BBZ2DHGpMj6kjIYSr+MXm8uW/PJtsd+lnOAl973Q/va3JWlROEJBiO9oee3i6wxdvFgN WMssf0TfWuFQpeGiqGn5vCywJoc8Rt/EUwawY41dI2lK7Q5OtTGY0ZBiNPJ6qSUj27T9 OsOg8OpkpdzWLX+wInglo6HDJvXSGcmj3AmRobJIpdDDH1608t2JmQ3tTD1xNJOxO20i J7iQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=a8drznb6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b9-20020aa7d489000000b0051ddbb1e3besi2653510edr.422.2023.07.21.13.52.57; Fri, 21 Jul 2023 13:53:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=a8drznb6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229976AbjGUUbw (ORCPT + 99 others); Fri, 21 Jul 2023 16:31:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50202 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229920AbjGUUbt (ORCPT ); Fri, 21 Jul 2023 16:31:49 -0400 Received: from mga18.intel.com (mga18.intel.com [134.134.136.126]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C51B7359C; Fri, 21 Jul 2023 13:31:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1689971502; x=1721507502; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=mU9iYrn6U9qmHj4FH3IrpTOXdH2NS6POHFhpT/W/4mc=; b=a8drznb6ozMgF0ncaFs8dFRoSdIwwRo2ysYdY52r5k2gwl+smv7BNjvw 4yPxYwso0ND2dllL96p98IjMCzdWAGcJDue5JWysAB4fl8tArFTRfd6nh diH6+InlkJxHioiJQon9XQrdeKVAs98Jr7eDhvFQYoTxKApFe6g9P7qC1 Z9ywtuAdxLV6DYx98268kQZYnDZoJ35rDfBUKhxXfzJzD9NDPjE/u8kmh BT9fxXxmjQiDQK9mguhfUTa5LYtrkE1BElH6l2agNbGNUQAQf53EhWOvi Xl8ExjvjC+dO6ayKs19bIG3vZyV4oODeKFs18ewAqiwXpat3r7uCPqyHI Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10778"; a="351998384" X-IronPort-AV: E=Sophos;i="6.01,222,1684825200"; d="scan'208";a="351998384" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Jul 2023 13:31:24 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10778"; a="898823817" X-IronPort-AV: E=Sophos;i="6.01,222,1684825200"; d="scan'208";a="898823817" Received: from lkp-server02.sh.intel.com (HELO 36946fcf73d7) ([10.239.97.151]) by orsmga005.jf.intel.com with ESMTP; 21 Jul 2023 13:31:21 -0700 Received: from kbuild by 36946fcf73d7 with local (Exim 4.96) (envelope-from ) id 1qMwmW-0007dv-0l; Fri, 21 Jul 2023 20:31:20 +0000 Date: Sat, 22 Jul 2023 04:31:18 +0800 From: kernel test robot To: Alexandre Ghiti , Paul Walmsley , Palmer Dabbelt , Albert Ou , Ard Biesheuvel , Kees Cook , linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, linux-efi@vger.kernel.org, linux-arm-kernel@lists.infradead.org Cc: oe-kbuild-all@lists.linux.dev, Alexandre Ghiti Subject: Re: [PATCH v5 3/5] arm64: libstub: Move KASLR handling functions to kaslr.c Message-ID: <202307220429.jaPTVAph-lkp@intel.com> References: <20230721074850.310644-4-alexghiti@rivosinc.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230721074850.310644-4-alexghiti@rivosinc.com> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Alexandre, kernel test robot noticed the following build warnings: [auto build test WARNING on linus/master] [also build test WARNING on v6.5-rc2 next-20230721] [cannot apply to efi/next] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Alexandre-Ghiti/riscv-Introduce-virtual-kernel-mapping-KASLR/20230721-155554 base: linus/master patch link: https://lore.kernel.org/r/20230721074850.310644-4-alexghiti%40rivosinc.com patch subject: [PATCH v5 3/5] arm64: libstub: Move KASLR handling functions to kaslr.c config: x86_64-kexec (https://download.01.org/0day-ci/archive/20230722/202307220429.jaPTVAph-lkp@intel.com/config) compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 reproduce: (https://download.01.org/0day-ci/archive/20230722/202307220429.jaPTVAph-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202307220429.jaPTVAph-lkp@intel.com/ All warnings (new ones prefixed by >>): drivers/firmware/efi/libstub/kaslr.c: In function 'efi_kaslr_relocate_kernel': >> drivers/firmware/efi/libstub/kaslr.c:113:30: warning: implicit declaration of function 'efi_get_kimg_min_align' [-Wimplicit-function-declaration] 113 | u64 min_kimg_align = efi_get_kimg_min_align(); | ^~~~~~~~~~~~~~~~~~~~~~ >> drivers/firmware/efi/libstub/kaslr.c:155:9: warning: implicit declaration of function 'efi_icache_sync'; did you mean 'efi_cache_sync_image'? [-Wimplicit-function-declaration] 155 | efi_icache_sync(*image_addr, *image_addr + kernel_codesize); | ^~~~~~~~~~~~~~~ | efi_cache_sync_image vim +/efi_get_kimg_min_align +113 drivers/firmware/efi/libstub/kaslr.c 87 88 /** 89 * efi_kaslr_relocate_kernel() - Relocate the kernel (random if KASLR enabled) 90 * @image_addr: Pointer to the current kernel location 91 * @reserve_addr: Pointer to the relocated kernel location 92 * @reserve_size: Size of the relocated kernel 93 * @kernel_size: Size of the text + data 94 * @kernel_codesize: Size of the text 95 * @kernel_memsize: Size of the text + data + bss 96 * @phys_seed: Random seed used for the relocation 97 * 98 * If KASLR is not enabled, this function relocates the kernel to a fixed 99 * address (or leave it as its current location). If KASLR is enabled, the 100 * kernel physical location is randomized using the seed in parameter. 101 * 102 * Return: status code, EFI_SUCCESS if relocation is successful 103 */ 104 efi_status_t efi_kaslr_relocate_kernel(unsigned long *image_addr, 105 unsigned long *reserve_addr, 106 unsigned long *reserve_size, 107 unsigned long kernel_size, 108 unsigned long kernel_codesize, 109 unsigned long kernel_memsize, 110 u32 phys_seed) 111 { 112 efi_status_t status; > 113 u64 min_kimg_align = efi_get_kimg_min_align(); 114 115 if (IS_ENABLED(CONFIG_RANDOMIZE_BASE) && phys_seed != 0) { 116 /* 117 * If KASLR is enabled, and we have some randomness available, 118 * locate the kernel at a randomized offset in physical memory. 119 */ 120 status = efi_random_alloc(*reserve_size, min_kimg_align, 121 reserve_addr, phys_seed, 122 EFI_LOADER_CODE); 123 if (status != EFI_SUCCESS) 124 efi_warn("efi_random_alloc() failed: 0x%lx\n", status); 125 } else { 126 status = EFI_OUT_OF_RESOURCES; 127 } 128 129 if (status != EFI_SUCCESS) { 130 if (!check_image_region(*image_addr, kernel_memsize)) { 131 efi_err("FIRMWARE BUG: Image BSS overlaps adjacent EFI memory region\n"); 132 } else if (IS_ALIGNED(*image_addr, min_kimg_align) && 133 (u64)_end < EFI_ALLOC_LIMIT) { 134 /* 135 * Just execute from wherever we were loaded by the 136 * UEFI PE/COFF loader if the placement is suitable. 137 */ 138 *reserve_size = 0; 139 return EFI_SUCCESS; 140 } 141 142 status = efi_allocate_pages_aligned(*reserve_size, reserve_addr, 143 ULONG_MAX, min_kimg_align, 144 EFI_LOADER_CODE); 145 146 if (status != EFI_SUCCESS) { 147 efi_err("Failed to relocate kernel\n"); 148 *reserve_size = 0; 149 return status; 150 } 151 } 152 153 memcpy((void *)*reserve_addr, (void *)*image_addr, kernel_size); 154 *image_addr = *reserve_addr; > 155 efi_icache_sync(*image_addr, *image_addr + kernel_codesize); -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki