Received: by 2002:a05:6358:701b:b0:131:369:b2a3 with SMTP id 27csp468364rwo; Fri, 21 Jul 2023 15:10:29 -0700 (PDT) X-Google-Smtp-Source: APBJJlEm9bD8+JjKxXon62tx6qA139pnOI2owybksSOkUe61SRfyS9uTlpJVKjnmliPnorTEOmNz X-Received: by 2002:a17:906:309a:b0:982:2586:f85 with SMTP id 26-20020a170906309a00b0098225860f85mr2800341ejv.65.1689977428994; Fri, 21 Jul 2023 15:10:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689977428; cv=none; d=google.com; s=arc-20160816; b=mnYcFwfvHgHtyuXwB1diXDC9LAxVYy0P4imeIZzJJoTjy/11+GDUtcW0I6PrBDEc5H b/JeM+1o5jOLI8n/oly1BOqiDXBUt9CwO1fYRWxbOX/ddwZj/ZJHnqIJcMmcv1tBlX2Y EXIphCcoDTxHyz5J4KuuqtPvbeMLARz9DWEhbGfBScy9GZaPvnMO6AYMWoTaLGnzY3EV I3g6evTVAcLfd7iTWcyK7w2/7YiElotx/+UZ5Y6oKBc2erTfpqvqKZO+4NjRpx1t/J1W r21PwSl4BsoMw2cWpmlCdypD206YESkNbNb7Ae0rxWJ4DBOcTaYhxYxkgdp0JAJBFUMg Appg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=oqYRz2he4KN4FjhFHXUFbIK2IgO33/49dqsRpD381C0=; fh=UOKHIEGsjjpR4ckVOCeNVzfXlyXrakdShuB4MqpMHnA=; b=PROAO3qMvkBv9SmD5yvRYvIDHLMnhDiw4khdCkzkGgr8UfxjtSorDpYpu94tZ1tWhV U94jC3TF9bwUWdouvfcJ7B7g6cx4450WCEDnyppn45PJ8k3qyCbbKw23kIifOL+4hePN 3/Bjv7dRc80peg0PlCMIrSHZbeSd+adUXxGUcPXehEnmg5gn9RIIdyx1KihiL7ZsY2CU Ms9ZdIfxiBHH6ANHNySd6Cy3Wvl1IIn+hWk4CAE4Vsbmwe8XXGyAQV7ByDD0V64Dwc7p oKSchonJSh39H2S+feoRLpJdg6YEan2Ua4vTQBx8/dp0BmvlymQa9fbdQY7kDQCoISzZ KQMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=mo8W2v6j; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d22-20020a17090694d600b0099351214a88si2847317ejy.637.2023.07.21.15.10.05; Fri, 21 Jul 2023 15:10:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=mo8W2v6j; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229628AbjGUVeQ (ORCPT + 99 others); Fri, 21 Jul 2023 17:34:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47716 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229942AbjGUVeP (ORCPT ); Fri, 21 Jul 2023 17:34:15 -0400 Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9DD6C3A85; Fri, 21 Jul 2023 14:34:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1689975253; x=1721511253; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=AejFBraB/yupNnoLODKplwxX7IK0ZxGoLJe5z3VP1tM=; b=mo8W2v6jrV7gOwSAUvOzpPS0BIeR3t/mZ3t+R5/caPLazLVjoUrT2bE7 jPhx3hkGGGkLMPQMOC3thVZfwEMu1IAuvl/uFcSMWT8mONbb0VFW7JB6a rwLETTXH034is28XdO6nKRteyXEkgZ/7q1ump5ke/GoodbbsW2PALbXqO zr6zb4AH75xOxTHlQ1tdMnokhjoejetR+/QhwpmGUNKD5Vj0od2slMwTA z3X8iwsikpv7IuihNmDytQmZc0WDHoZt+TJuE1Rt/k+Jj2dZ9NB4ngs78 MO4EItUi9fNHtxgZvdQnxaUkf5g1o3Rzq79fuATp3FyODFo60yj0zPwQO g==; X-IronPort-AV: E=McAfee;i="6600,9927,10778"; a="364584389" X-IronPort-AV: E=Sophos;i="6.01,222,1684825200"; d="scan'208";a="364584389" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Jul 2023 14:33:56 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10778"; a="790314176" X-IronPort-AV: E=Sophos;i="6.01,222,1684825200"; d="scan'208";a="790314176" Received: from lkp-server02.sh.intel.com (HELO 36946fcf73d7) ([10.239.97.151]) by fmsmga008.fm.intel.com with ESMTP; 21 Jul 2023 14:33:53 -0700 Received: from kbuild by 36946fcf73d7 with local (Exim 4.96) (envelope-from ) id 1qMxl2-0007g5-1u; Fri, 21 Jul 2023 21:33:52 +0000 Date: Sat, 22 Jul 2023 05:32:58 +0800 From: kernel test robot To: Alexandre Ghiti , Paul Walmsley , Palmer Dabbelt , Albert Ou , Ard Biesheuvel , Kees Cook , linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, linux-efi@vger.kernel.org, linux-arm-kernel@lists.infradead.org Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, Alexandre Ghiti Subject: Re: [PATCH v5 3/5] arm64: libstub: Move KASLR handling functions to kaslr.c Message-ID: <202307220545.aNYBwGqt-lkp@intel.com> References: <20230721074850.310644-4-alexghiti@rivosinc.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230721074850.310644-4-alexghiti@rivosinc.com> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Alexandre, kernel test robot noticed the following build warnings: [auto build test WARNING on linus/master] [also build test WARNING on v6.5-rc2 next-20230721] [cannot apply to efi/next] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Alexandre-Ghiti/riscv-Introduce-virtual-kernel-mapping-KASLR/20230721-155554 base: linus/master patch link: https://lore.kernel.org/r/20230721074850.310644-4-alexghiti%40rivosinc.com patch subject: [PATCH v5 3/5] arm64: libstub: Move KASLR handling functions to kaslr.c config: i386-randconfig-i002-20230721 (https://download.01.org/0day-ci/archive/20230722/202307220545.aNYBwGqt-lkp@intel.com/config) compiler: clang version 15.0.7 (https://github.com/llvm/llvm-project.git 8dfdcc7b7bf66834a761bd8de445840ef68e4d1a) reproduce: (https://download.01.org/0day-ci/archive/20230722/202307220545.aNYBwGqt-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202307220545.aNYBwGqt-lkp@intel.com/ All warnings (new ones prefixed by >>): >> drivers/firmware/efi/libstub/kaslr.c:113:23: warning: call to undeclared function 'efi_get_kimg_min_align'; ISO C99 and later do not support implicit function declarations [-Wimplicit-function-declaration] u64 min_kimg_align = efi_get_kimg_min_align(); ^ >> drivers/firmware/efi/libstub/kaslr.c:155:2: warning: call to undeclared function 'efi_icache_sync'; ISO C99 and later do not support implicit function declarations [-Wimplicit-function-declaration] efi_icache_sync(*image_addr, *image_addr + kernel_codesize); ^ 2 warnings generated. vim +/efi_get_kimg_min_align +113 drivers/firmware/efi/libstub/kaslr.c 87 88 /** 89 * efi_kaslr_relocate_kernel() - Relocate the kernel (random if KASLR enabled) 90 * @image_addr: Pointer to the current kernel location 91 * @reserve_addr: Pointer to the relocated kernel location 92 * @reserve_size: Size of the relocated kernel 93 * @kernel_size: Size of the text + data 94 * @kernel_codesize: Size of the text 95 * @kernel_memsize: Size of the text + data + bss 96 * @phys_seed: Random seed used for the relocation 97 * 98 * If KASLR is not enabled, this function relocates the kernel to a fixed 99 * address (or leave it as its current location). If KASLR is enabled, the 100 * kernel physical location is randomized using the seed in parameter. 101 * 102 * Return: status code, EFI_SUCCESS if relocation is successful 103 */ 104 efi_status_t efi_kaslr_relocate_kernel(unsigned long *image_addr, 105 unsigned long *reserve_addr, 106 unsigned long *reserve_size, 107 unsigned long kernel_size, 108 unsigned long kernel_codesize, 109 unsigned long kernel_memsize, 110 u32 phys_seed) 111 { 112 efi_status_t status; > 113 u64 min_kimg_align = efi_get_kimg_min_align(); 114 115 if (IS_ENABLED(CONFIG_RANDOMIZE_BASE) && phys_seed != 0) { 116 /* 117 * If KASLR is enabled, and we have some randomness available, 118 * locate the kernel at a randomized offset in physical memory. 119 */ 120 status = efi_random_alloc(*reserve_size, min_kimg_align, 121 reserve_addr, phys_seed, 122 EFI_LOADER_CODE); 123 if (status != EFI_SUCCESS) 124 efi_warn("efi_random_alloc() failed: 0x%lx\n", status); 125 } else { 126 status = EFI_OUT_OF_RESOURCES; 127 } 128 129 if (status != EFI_SUCCESS) { 130 if (!check_image_region(*image_addr, kernel_memsize)) { 131 efi_err("FIRMWARE BUG: Image BSS overlaps adjacent EFI memory region\n"); 132 } else if (IS_ALIGNED(*image_addr, min_kimg_align) && 133 (u64)_end < EFI_ALLOC_LIMIT) { 134 /* 135 * Just execute from wherever we were loaded by the 136 * UEFI PE/COFF loader if the placement is suitable. 137 */ 138 *reserve_size = 0; 139 return EFI_SUCCESS; 140 } 141 142 status = efi_allocate_pages_aligned(*reserve_size, reserve_addr, 143 ULONG_MAX, min_kimg_align, 144 EFI_LOADER_CODE); 145 146 if (status != EFI_SUCCESS) { 147 efi_err("Failed to relocate kernel\n"); 148 *reserve_size = 0; 149 return status; 150 } 151 } 152 153 memcpy((void *)*reserve_addr, (void *)*image_addr, kernel_size); 154 *image_addr = *reserve_addr; > 155 efi_icache_sync(*image_addr, *image_addr + kernel_codesize); -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki