mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-18 16:44:27 +08:00
efc72a665a
The following warning was seen:
WARNING: CPU: 0 PID: 0 at arch/x86/kernel/alternative.c:557 apply_returns (arch/x86/kernel/alternative.c:557 (discriminator 1))
Modules linked in:
CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.19.0-rc4-00008-gee88d363d156 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-debian-1.16.0-4 04/01/2014
RIP: 0010:apply_returns (arch/x86/kernel/alternative.c:557 (discriminator 1))
Code: ff ff 74 cb 48 83 c5 04 49 39 ee 0f 87 81 fe ff ff e9 22 ff ff ff 0f 0b 48 83 c5 04 49 39 ee 0f 87 6d fe ff ff e9 0e ff ff ff <0f> 0b 48 83 c5 04 49 39 ee 0f 87 59 fe ff ff e9 fa fe ff ff 48 89
The warning happened when apply_returns() failed to convert "JMP
__x86_return_thunk" to RET. It was instead a JMP to nowhere, due to the
thunk relocation not getting resolved.
That rodata.o code is objcopy'd to .rodata, and later memcpy'd, so
relocations don't work (and are apparently silently ignored).
LKDTM is only used for testing, so the naked RET should be fine. So
just disable return thunks for that file.
While at it, disable objtool and KCSAN for the file.
Fixes: 0b53c374b9
("x86/retpoline: Use -mfunction-return")
Reported-by: kernel test robot <oliver.sang@intel.com>
Debugged-by: Peter Zijlstra <peterz@infradead.org>
Signed-off-by: Josh Poimboeuf <jpoimboe@kernel.org>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lore.kernel.org/lkml/Ys58BxHxoDZ7rfpr@xsang-OptiPlex-9020/
30 lines
934 B
Makefile
30 lines
934 B
Makefile
# SPDX-License-Identifier: GPL-2.0
|
|
obj-$(CONFIG_LKDTM) += lkdtm.o
|
|
|
|
lkdtm-$(CONFIG_LKDTM) += core.o
|
|
lkdtm-$(CONFIG_LKDTM) += bugs.o
|
|
lkdtm-$(CONFIG_LKDTM) += heap.o
|
|
lkdtm-$(CONFIG_LKDTM) += perms.o
|
|
lkdtm-$(CONFIG_LKDTM) += refcount.o
|
|
lkdtm-$(CONFIG_LKDTM) += rodata_objcopy.o
|
|
lkdtm-$(CONFIG_LKDTM) += usercopy.o
|
|
lkdtm-$(CONFIG_LKDTM) += stackleak.o
|
|
lkdtm-$(CONFIG_LKDTM) += cfi.o
|
|
lkdtm-$(CONFIG_LKDTM) += fortify.o
|
|
lkdtm-$(CONFIG_PPC_64S_HASH_MMU) += powerpc.o
|
|
|
|
KASAN_SANITIZE_stackleak.o := n
|
|
|
|
KASAN_SANITIZE_rodata.o := n
|
|
KCSAN_SANITIZE_rodata.o := n
|
|
KCOV_INSTRUMENT_rodata.o := n
|
|
OBJECT_FILES_NON_STANDARD_rodata.o := y
|
|
CFLAGS_REMOVE_rodata.o += $(CC_FLAGS_LTO) $(RETHUNK_CFLAGS)
|
|
|
|
OBJCOPYFLAGS :=
|
|
OBJCOPYFLAGS_rodata_objcopy.o := \
|
|
--rename-section .noinstr.text=.rodata,alloc,readonly,load,contents
|
|
targets += rodata.o rodata_objcopy.o
|
|
$(obj)/rodata_objcopy.o: $(obj)/rodata.o FORCE
|
|
$(call if_changed,objcopy)
|