Compile error ppc64le: Cannot find symbol for section 11: .text.unlikely.

Coiby Xu coxu at redhat.com
Tue Nov 30 18:26:37 PST 2021


On Wed, Dec 01, 2021 at 10:19:26AM +0800, Coiby Xu wrote:
>On Wed, Nov 24, 2021 at 09:47:43PM +0800, Baoquan He wrote:
>>On 11/24/21 at 01:47pm, Veronika Kabatova wrote:
>>>Hi,
>>>
>>>for a while we've been seen the following error when compiling
>>>the mainline kernel with gcc 11.2 and binutils 2.37:
>>>
>>>00:02:32 Cannot find symbol for section 11: .text.unlikely.
>>>00:02:32 kernel/kexec_file.o: failed
>>>00:02:32 make[3]: *** [scripts/Makefile.build:287: kernel/kexec_file.o] Error 1
>>>00:02:32 make[3]: *** Deleting file 'kernel/kexec_file.o'
>>>00:02:32 make[2]: *** [Makefile:1846: kernel] Error 2
>>>00:02:32 make[2]: *** Waiting for unfinished jobs....
>>>
>>>The error only happens with ppc64le. I've tested this with cross
>>>compilation, but the only reference to the error I found suggests
>>>the same happens with the native compiles as well:
>>>
>>>https://github.com/groeck/linux-build-test/commit/142cbefbc0d37962c9a6c7f28ee415ecd5fd1e98
>>>
>>>In case it matters, the config used is the Fedora config with
>>>kselftest options enabled, which you can grab from
>>>
>>>https://gitlab.com/redhat/red-hat-ci-tools/kernel/cki-internal-pipelines/cki-trusted-contributors/-/jobs/1760752896/artifacts/raw/artifacts/kernel-mainline.kernel.org-ppc64le-e4e737bb5c170df6135a127739a9e6148ee3da82.config
>>>
>>>
>>>I've reached out to the Fedora compiler folks and Nick Clifton
>>>suggested this is a problem with the kernel:
>>>
>>>    This message comes from the recordmcount tool, which is part of the kernel
>>>    sources:
>>>
>>>    linux/scripts/recordmcount.[ch]
>>>
>>>    It appears to be triggered when a compiler update causes code to be
>>>    rearranged. The problem has been reported before in various forums,
>>>    but in particular I found this reference:
>>>
>>>    https://lore.kernel.org/lkml/20201204165742.3815221-2-arnd@kernel.org/
>>>
>>>    The point of which to me at least is that this is a kernel issue rather than
>>>    a compiler issue.  Ie there must be some weak symbols in kexec_file.o file
>>>    which need to be moved elsewhere.
>>
>>It could be arch_kexec_kernel_verify_sig() in kernel/kexec_file.c which
>>is __weak, but not implemented in any ARCH. If true, this has been
>>pointed out by Eric in one patch thread from Coiby.
>>
>>[PATCH v3 1/3] kexec: clean up arch_kexec_kernel_verify_sig
>>http://lkml.kernel.org/r/20211018083137.338757-2-coxu@redhat.com
>>
>>Maybe Coiby can fetch above config file and run the test to check.
>
>"[PATCH v3 1/3] kexec: clean up arch_kexec_kernel_verify_sig" alone
>would fix the error. If I turn arch_kexec_apply_relocations{_add,} into
  ^^^^^
  wouldn't 

Sorry I made a typo.

>static function, the error would be gone. As attached is the patch would
>make this error disappear.
>
>However, s390 and x86 have its own implementation of
>arch_kexec_apply_relocations_add. This makes it looks like to be gcc's
>issue.
>
>
>>
>>Thanks
>>Baoquan
>>
>
>-- 
>Best regards,
>Coiby

>From 49e0333f5a0743cdcc99777218524d6a6cd5ec34 Mon Sep 17 00:00:00 2001
>From: Coiby Xu <coxu at redhat.com>
>Date: Mon, 18 Oct 2021 15:52:46 +0800
>Subject: [PATCH] fix error "ppc64le: Cannot find symbol for section 11:
> .text.unlikely."
>
>---
> include/linux/kexec.h | 13 -------------
> kernel/kexec_file.c   | 40 ++++++++++++++++------------------------
> 2 files changed, 16 insertions(+), 37 deletions(-)
>
>diff --git a/include/linux/kexec.h b/include/linux/kexec.h
>index 0c994ae37..1476470a1 100644
>--- a/include/linux/kexec.h
>+++ b/include/linux/kexec.h
>@@ -186,20 +186,7 @@ void *kexec_purgatory_get_symbol_addr(struct kimage *image, const char *name);
> /* Architectures may override the below functions */
> int arch_kexec_kernel_image_probe(struct kimage *image, void *buf,
> 				  unsigned long buf_len);
>-void *arch_kexec_kernel_image_load(struct kimage *image);
>-int arch_kexec_apply_relocations_add(struct purgatory_info *pi,
>-				     Elf_Shdr *section,
>-				     const Elf_Shdr *relsec,
>-				     const Elf_Shdr *symtab);
>-int arch_kexec_apply_relocations(struct purgatory_info *pi,
>-				 Elf_Shdr *section,
>-				 const Elf_Shdr *relsec,
>-				 const Elf_Shdr *symtab);
> int arch_kimage_file_post_load_cleanup(struct kimage *image);
>-#ifdef CONFIG_KEXEC_SIG
>-int arch_kexec_kernel_verify_sig(struct kimage *image, void *buf,
>-				 unsigned long buf_len);
>-#endif
> int arch_kexec_locate_mem_hole(struct kexec_buf *kbuf);
>
> extern int kexec_add_buffer(struct kexec_buf *kbuf);
>diff --git a/kernel/kexec_file.c b/kernel/kexec_file.c
>index 8347fc158..e0afe36d3 100644
>--- a/kernel/kexec_file.c
>+++ b/kernel/kexec_file.c
>@@ -71,7 +71,7 @@ static void *kexec_image_load_default(struct kimage *image)
> 				 image->cmdline_buf_len);
> }
>
>-void * __weak arch_kexec_kernel_image_load(struct kimage *image)
>+static void * arch_kexec_kernel_image_load(struct kimage *image)
> {
> 	return kexec_image_load_default(image);
> }
>@@ -89,25 +89,6 @@ int __weak arch_kimage_file_post_load_cleanup(struct kimage *image)
> 	return kexec_image_post_load_cleanup_default(image);
> }
>
>-#ifdef CONFIG_KEXEC_SIG
>-static int kexec_image_verify_sig_default(struct kimage *image, void *buf,
>-					  unsigned long buf_len)
>-{
>-	if (!image->fops || !image->fops->verify_sig) {
>-		pr_debug("kernel loader does not support signature verification.\n");
>-		return -EKEYREJECTED;
>-	}
>-
>-	return image->fops->verify_sig(buf, buf_len);
>-}
>-
>-int __weak arch_kexec_kernel_verify_sig(struct kimage *image, void *buf,
>-					unsigned long buf_len)
>-{
>-	return kexec_image_verify_sig_default(image, buf, buf_len);
>-}
>-#endif
>-
> /*
>  * arch_kexec_apply_relocations_add - apply relocations of type RELA
>  * @pi:		Purgatory to be relocated.
>@@ -117,7 +98,7 @@ int __weak arch_kexec_kernel_verify_sig(struct kimage *image, void *buf,
>  *
>  * Return: 0 on success, negative errno on error.
>  */
>-int __weak
>+static int
> arch_kexec_apply_relocations_add(struct purgatory_info *pi, Elf_Shdr *section,
> 				 const Elf_Shdr *relsec, const Elf_Shdr *symtab)
> {
>@@ -134,7 +115,7 @@ arch_kexec_apply_relocations_add(struct purgatory_info *pi, Elf_Shdr *section,
>  *
>  * Return: 0 on success, negative errno on error.
>  */
>-int __weak
>+static int
> arch_kexec_apply_relocations(struct purgatory_info *pi, Elf_Shdr *section,
> 			     const Elf_Shdr *relsec, const Elf_Shdr *symtab)
> {
>@@ -184,13 +165,24 @@ void kimage_file_post_load_cleanup(struct kimage *image)
> }
>
> #ifdef CONFIG_KEXEC_SIG
>+static int kexec_image_verify_sig(struct kimage *image, void *buf,
>+		unsigned long buf_len)
>+{
>+	if (!image->fops || !image->fops->verify_sig) {
>+		pr_debug("kernel loader does not support signature verification.\n");
>+		return -EKEYREJECTED;
>+	}
>+
>+	return image->fops->verify_sig(buf, buf_len);
>+}
>+
> static int
> kimage_validate_signature(struct kimage *image)
> {
> 	int ret;
>
>-	ret = arch_kexec_kernel_verify_sig(image, image->kernel_buf,
>-					   image->kernel_buf_len);
>+	ret = kexec_image_verify_sig(image, image->kernel_buf,
>+			image->kernel_buf_len);
> 	if (ret) {
>
> 		if (IS_ENABLED(CONFIG_KEXEC_SIG_FORCE)) {
>-- 
>2.33.1
>


-- 
Best regards,
Coiby




More information about the kexec mailing list