From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 90BF4EE4993 for ; Wed, 23 Aug 2023 11:03:27 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id D1414280061; Wed, 23 Aug 2023 07:03:26 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id CC42228005F; Wed, 23 Aug 2023 07:03:26 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B8C24280061; Wed, 23 Aug 2023 07:03:26 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id AA46228005F for ; Wed, 23 Aug 2023 07:03:26 -0400 (EDT) Received: from smtpin13.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id 81F3A1C94DE for ; Wed, 23 Aug 2023 11:03:26 +0000 (UTC) X-FDA: 81155083212.13.F782DCE Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.43]) by imf30.hostedemail.com (Postfix) with ESMTP id AC6488000C for ; Wed, 23 Aug 2023 11:03:23 +0000 (UTC) Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b="ggV/RfOJ"; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf30.hostedemail.com: domain of lkp@intel.com designates 192.55.52.43 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1692788604; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=4z5en/fZTZfhX4/Df8eCUYBeoPhgRBDjHRorGgCmL8U=; b=nRNDtr1yY5HuBa1M5rtrVPBXPXrUAe0g60vVNGlr3AFsRq7BctGyrkDK9rzOW0hjDgidIc QK6TtMkyZtIpRPK+BF0phex/jkfyXeceVVm1DnLeYJHdw3kNyxBZHsnciUpYwq0LhYxFQG G+V/VnOovo26YQXJghftiZGvt9q+xsA= ARC-Authentication-Results: i=1; imf30.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b="ggV/RfOJ"; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf30.hostedemail.com: domain of lkp@intel.com designates 192.55.52.43 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1692788604; a=rsa-sha256; cv=none; b=JRvx35tBAphD5n0F9nLdd2hlBJovDjjfCJA5quHJu3aO+QqfNfaCWRDUxh0WJ8xJTzzgn9 84l1x2fO9tdsndP8hH06yqQ/0bB3WvA5VvRZmMmEIiz6ijqxnsKJWwB7DQC5paGi71Y0tn PelTN70rFEM6RJyZDR0nE4XVbdYKt2w= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1692788603; x=1724324603; h=date:from:to:cc:subject:message-id:mime-version; bh=90mFy0giDcyu6emWCddSJtkY89m9kcGhMqnajXR+Zes=; b=ggV/RfOJ34pd+klHMq/BzkKNNEunsbPQ/ClE/EUAKkoaVFuX1gVO3ClD ijGkNpZmgIKYHjm8VPjetacMapJTCmP0AO8nI7GJWqmy/9PBtUqrwsZX1 2h6FHpxIlSHTD1OHSnyTPM3ch6Usze2GltMeA65wCjcUw9fidNPEug8o9 UcamnZwTbxIqvntl3hlykEy7aQCnGt/R21WGkUkRE2xOxmimtybTxfXih RAB5WKSteO7ZT8Owa7EwTm6mkP1Nyx4ZDZ+nQeA/1g1/bUeInZvTKuCpD 1+v3XhuegIlB/tX0vfzX2tmVCB839rgl2l57587+NxNvLp7h+HG3bt9eK w==; X-IronPort-AV: E=McAfee;i="6600,9927,10810"; a="460500136" X-IronPort-AV: E=Sophos;i="6.01,195,1684825200"; d="scan'208";a="460500136" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Aug 2023 04:03:22 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10810"; a="730175867" X-IronPort-AV: E=Sophos;i="6.01,195,1684825200"; d="scan'208";a="730175867" Received: from lkp-server02.sh.intel.com (HELO daf8bb0a381d) ([10.239.97.151]) by orsmga007.jf.intel.com with ESMTP; 23 Aug 2023 04:03:20 -0700 Received: from kbuild by daf8bb0a381d with local (Exim 4.96) (envelope-from ) id 1qYldv-00017m-0t; Wed, 23 Aug 2023 11:03:19 +0000 Date: Wed, 23 Aug 2023 19:02:39 +0800 From: kernel test robot To: Tianyu Lan Cc: oe-kbuild-all@lists.linux.dev, Linux Memory Management List , Wei Liu , Dexuan Cui , Michael Kelley Subject: [linux-next:master 11576/12208] arch/x86/kernel/cpu/mshyperv.c:407: undefined reference to `isolation_type_en_snp' Message-ID: <202308231805.RyYOycAU-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspamd-Queue-Id: AC6488000C X-Rspam-User: X-Rspamd-Server: rspam04 X-Stat-Signature: eurqcqoxta4zu3fx55r88jfa6np4983m X-HE-Tag: 1692788603-545098 X-HE-Meta: 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 i4ss/tVC X69bpPukLM/IbWcPChxFe3EXes+obXXwQK5GJMQyGQeFSVnNt7c+/HgCZUmQe72JH8IrJCy7IJxOw6JLJhQo58D1Mgkjl1oLMVf9iqVGMgYsif5s396t2S/H8sXlRkGFXG5gW1MFyqQlj/sOVDe9vgUOSi/jlRiYIajbNrt+lNkYSOWAwWWWFBEAxFyI+o2dkd3Zer/qmKi8T+QDPcH9MGKy1aJowz44mzzF8RMDCEBSS4emVAaqKbxyMervz8YB5F/gYDE7HtGicMzxk0QYi7XZmItJcRbuey2Fgwdy2HZb6B5GOLej3Rutf8UlnTL4SkfGzumlW7aNDnYBMxDlqDzcPv+0vqh/gzEd4 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master head: e3f80d3eae76c3557b3c9b5938ad01c0e6cf25ec commit: d6e2d652443751e290b2edb70173ec3c22f78fbe [11576/12208] x86/hyperv: Add sev-snp enlightened guest static key config: x86_64-randconfig-103-20230823 (https://download.01.org/0day-ci/archive/20230823/202308231805.RyYOycAU-lkp@intel.com/config) compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 reproduce: (https://download.01.org/0day-ci/archive/20230823/202308231805.RyYOycAU-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202308231805.RyYOycAU-lkp@intel.com/ All errors (new ones prefixed by >>): ld: vmlinux.o: in function `ms_hyperv_init_platform': >> arch/x86/kernel/cpu/mshyperv.c:407: undefined reference to `isolation_type_en_snp' vim +407 arch/x86/kernel/cpu/mshyperv.c 327 328 /* 329 * Extract the features and hints 330 */ 331 ms_hyperv.features = cpuid_eax(HYPERV_CPUID_FEATURES); 332 ms_hyperv.priv_high = cpuid_ebx(HYPERV_CPUID_FEATURES); 333 ms_hyperv.misc_features = cpuid_edx(HYPERV_CPUID_FEATURES); 334 ms_hyperv.hints = cpuid_eax(HYPERV_CPUID_ENLIGHTMENT_INFO); 335 336 hv_max_functions_eax = cpuid_eax(HYPERV_CPUID_VENDOR_AND_MAX_FUNCTIONS); 337 338 pr_info("Hyper-V: privilege flags low 0x%x, high 0x%x, hints 0x%x, misc 0x%x\n", 339 ms_hyperv.features, ms_hyperv.priv_high, ms_hyperv.hints, 340 ms_hyperv.misc_features); 341 342 ms_hyperv.max_vp_index = cpuid_eax(HYPERV_CPUID_IMPLEMENT_LIMITS); 343 ms_hyperv.max_lp_index = cpuid_ebx(HYPERV_CPUID_IMPLEMENT_LIMITS); 344 345 pr_debug("Hyper-V: max %u virtual processors, %u logical processors\n", 346 ms_hyperv.max_vp_index, ms_hyperv.max_lp_index); 347 348 /* 349 * Check CPU management privilege. 350 * 351 * To mirror what Windows does we should extract CPU management 352 * features and use the ReservedIdentityBit to detect if Linux is the 353 * root partition. But that requires negotiating CPU management 354 * interface (a process to be finalized). For now, use the privilege 355 * flag as the indicator for running as root. 356 * 357 * Hyper-V should never specify running as root and as a Confidential 358 * VM. But to protect against a compromised/malicious Hyper-V trying 359 * to exploit root behavior to expose Confidential VM memory, ignore 360 * the root partition setting if also a Confidential VM. 361 */ 362 if ((ms_hyperv.priv_high & HV_CPU_MANAGEMENT) && 363 !(ms_hyperv.priv_high & HV_ISOLATION)) { 364 hv_root_partition = true; 365 pr_info("Hyper-V: running as root partition\n"); 366 } 367 368 if (ms_hyperv.hints & HV_X64_HYPERV_NESTED) { 369 hv_nested = true; 370 pr_info("Hyper-V: running on a nested hypervisor\n"); 371 } 372 373 /* 374 * Extract host information. 375 */ 376 if (hv_max_functions_eax >= HYPERV_CPUID_VERSION) { 377 hv_host_info_eax = cpuid_eax(HYPERV_CPUID_VERSION); 378 hv_host_info_ebx = cpuid_ebx(HYPERV_CPUID_VERSION); 379 hv_host_info_ecx = cpuid_ecx(HYPERV_CPUID_VERSION); 380 hv_host_info_edx = cpuid_edx(HYPERV_CPUID_VERSION); 381 382 pr_info("Hyper-V: Host Build %d.%d.%d.%d-%d-%d\n", 383 hv_host_info_ebx >> 16, hv_host_info_ebx & 0xFFFF, 384 hv_host_info_eax, hv_host_info_edx & 0xFFFFFF, 385 hv_host_info_ecx, hv_host_info_edx >> 24); 386 } 387 388 if (ms_hyperv.features & HV_ACCESS_FREQUENCY_MSRS && 389 ms_hyperv.misc_features & HV_FEATURE_FREQUENCY_MSRS_AVAILABLE) { 390 x86_platform.calibrate_tsc = hv_get_tsc_khz; 391 x86_platform.calibrate_cpu = hv_get_tsc_khz; 392 } 393 394 if (ms_hyperv.priv_high & HV_ISOLATION) { 395 ms_hyperv.isolation_config_a = cpuid_eax(HYPERV_CPUID_ISOLATION_CONFIG); 396 ms_hyperv.isolation_config_b = cpuid_ebx(HYPERV_CPUID_ISOLATION_CONFIG); 397 398 if (ms_hyperv.shared_gpa_boundary_active) 399 ms_hyperv.shared_gpa_boundary = 400 BIT_ULL(ms_hyperv.shared_gpa_boundary_bits); 401 402 pr_info("Hyper-V: Isolation Config: Group A 0x%x, Group B 0x%x\n", 403 ms_hyperv.isolation_config_a, ms_hyperv.isolation_config_b); 404 405 406 if (cc_platform_has(CC_ATTR_GUEST_SEV_SNP)) { > 407 static_branch_enable(&isolation_type_en_snp); 408 } else if (hv_get_isolation_type() == HV_ISOLATION_TYPE_SNP) { 409 static_branch_enable(&isolation_type_snp); 410 } 411 } 412 413 if (hv_max_functions_eax >= HYPERV_CPUID_NESTED_FEATURES) { 414 ms_hyperv.nested_features = 415 cpuid_eax(HYPERV_CPUID_NESTED_FEATURES); 416 pr_info("Hyper-V: Nested features: 0x%x\n", 417 ms_hyperv.nested_features); 418 } 419 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki