From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id BF32EC3ABAA for ; Thu, 1 May 2025 19:50:36 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 24A136B008A; Thu, 1 May 2025 15:50:35 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 1FC116B008C; Thu, 1 May 2025 15:50:35 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 09B976B0092; Thu, 1 May 2025 15:50:35 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id DC8EA6B008A for ; Thu, 1 May 2025 15:50:34 -0400 (EDT) Received: from smtpin09.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 774C3141402 for ; Thu, 1 May 2025 19:50:35 +0000 (UTC) X-FDA: 83395381230.09.51ABF6F Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.16]) by imf02.hostedemail.com (Postfix) with ESMTP id F211180007 for ; Thu, 1 May 2025 19:50:32 +0000 (UTC) Authentication-Results: imf02.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=Vm4QbSOB; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf02.hostedemail.com: domain of lkp@intel.com designates 198.175.65.16 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1746129033; a=rsa-sha256; cv=none; b=uErcezEI1/qXQSjnnKpVTX7Ej6IqeiRsRLVN1lmeZPanO9ZKkGtgWhSF07xxLxM+WqZ4/J QL+U/qR+Bj/PPglCf0DctapfKlRTv/q+B8huBkhIq0YVhL/qE3ybUEjUCZUXZF/3AM2j5f cKPfg96j4HbL08tFeejVrjU5fsW3HF0= ARC-Authentication-Results: i=1; imf02.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=Vm4QbSOB; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf02.hostedemail.com: domain of lkp@intel.com designates 198.175.65.16 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1746129033; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=dSJ/bShXTx+bT2texcj3/PAIUrwWlmsxFiNJe7qGSBc=; b=KbR6Q2kdi8i4oEPz8XxRQT97R9ph3fpM/du03oHsJzbi9kxiy5O9H2Q4XeB7VqwquRrfxz OMnQzu0hrS0HAPImJdj2Yk/rh+t0ms+q4Gd9odZHRsInwdkMxoIZzuc7hgye2/WLdgO3nK pFsh7QhccqkkOrXdLnSwRDu6E0AdmAE= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1746129033; x=1777665033; h=date:from:to:cc:subject:message-id:references: mime-version:content-transfer-encoding:in-reply-to; bh=j3XVFqJOmEgc3Kxeztq12WifRxzExRA9O0IO+pohifo=; b=Vm4QbSOBGInbrCL/XuBg6vy5v7PhBPe1j5TdTNqAQQUBD+Gt6uGnPikf +byzrbZZXWjhms3dIMNCZF+EFOiQdGnm0BzIMAanfTHsIhuz5VBojqDj6 d4XIUb1aCyGEUV07c1Z/6Oqd1s/1M0VkfWITpEaZ8oJYhPm7H079AhEfP NTGe4/NAktA3o2dGmcCd4Q9MsLlv1egI2slgBxxDpOHugZ1zjd5paVCeS n+iZF0uKXKvG/TEGLjWOTTT5kOk9DDSg+DMZHxKtNCsz1W99KjEOaXCQL VE7rq0sgMZ5XxxEE9lUOVzjbz6sEM0WuhyrApzXvSjUy689M6YAz7UUw0 g==; X-CSE-ConnectionGUID: nE098NxmRMSl4ljLlXVGGg== X-CSE-MsgGUID: uL9s7dCaR4q9I3/ptHx2OA== X-IronPort-AV: E=McAfee;i="6700,10204,11420"; a="47901176" X-IronPort-AV: E=Sophos;i="6.15,254,1739865600"; d="scan'208";a="47901176" Received: from fmviesa005.fm.intel.com ([10.60.135.145]) by orvoesa108.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 May 2025 12:50:32 -0700 X-CSE-ConnectionGUID: leHSOd7WTA6rm1JNi1h3DQ== X-CSE-MsgGUID: BvvBGMibQ6STdxxCekon9w== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.15,254,1739865600"; d="scan'208";a="139276612" Received: from lkp-server01.sh.intel.com (HELO 1992f890471c) ([10.239.97.150]) by fmviesa005.fm.intel.com with ESMTP; 01 May 2025 12:50:25 -0700 Received: from kbuild by 1992f890471c with local (Exim 4.96) (envelope-from ) id 1uAZvK-0004M5-25; Thu, 01 May 2025 19:50:22 +0000 Date: Fri, 2 May 2025 03:50:16 +0800 From: kernel test robot To: Deepak Gupta , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org, "H. Peter Anvin" , Andrew Morton , "Liam R. Howlett" , Vlastimil Babka , Lorenzo Stoakes , Paul Walmsley , Palmer Dabbelt , Albert Ou , Conor Dooley , Rob Herring , Krzysztof Kozlowski , Arnd Bergmann , Christian Brauner , Peter Zijlstra , Oleg Nesterov , Eric Biederman , Kees Cook , Jonathan Corbet , Shuah Khan , Jann Horn , Miguel Ojeda , Alex Gaynor , Boqun Feng , Gary Guo Cc: oe-kbuild-all@lists.linux.dev, Linux Memory Management List Subject: Re: [PATCH v14 22/27] riscv: enable kernel access to shadow stack memory via FWFT sbi call Message-ID: <202505020328.CJ8EA6Od-lkp@intel.com> References: <20250429-v5_user_cfi_series-v14-22-5239410d012a@rivosinc.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20250429-v5_user_cfi_series-v14-22-5239410d012a@rivosinc.com> X-Rspamd-Server: rspam03 X-Rspamd-Queue-Id: F211180007 X-Stat-Signature: wju41ikxyprqsruyui8fs97bn9nxtsw9 X-Rspam-User: X-HE-Tag: 1746129032-160686 X-HE-Meta: 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 DFYODw/f zb0x4YKhkW3mTnpRA3o2qeH4Brlo08nNMvPLHmm0WRziz/SrYVFnt/0g3S5VVnA63Dnoxw797vymNi5xIeBnu0ihN01GlNeuAUtc12ScoGDGUO0Bjhn8uxegKucuvcp9GCHe0eR0JymdseAY/WW19lBPdiyJuTWGRa6IlVvjUiWNVFqY1ZpeYmvRNXKgIAZmdywa0EU/HGWL/eQjcxQ1WE8vyFXGNzNSbjnG/IWHNmBVijOxtuwRu6lsLumcDlOrygOZXanHQ/Ng1JtQXmY4D+zhExXhs93BSPPri/Xip9SVC/kArY382SAVNaG9Sx+C07c4se9FXJ2BDgxnAHSWWAROJe/TlD30MwIREh7FLbNf9u6rLlblIdBzTi9lyPS4OfzVjFPorffcjIW0r2Mj91YtjiJ8bpbnMeK0gaBiGKjYxo1u4b3tFtsEpIxiMiKYpZEan X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi Deepak, kernel test robot noticed the following build errors: [auto build test ERROR on 4181f8ad7a1061efed0219951d608d4988302af7] url: https://github.com/intel-lab-lkp/linux/commits/Deepak-Gupta/mm-VM_SHADOW_STACK-definition-for-riscv/20250430-082727 base: 4181f8ad7a1061efed0219951d608d4988302af7 patch link: https://lore.kernel.org/r/20250429-v5_user_cfi_series-v14-22-5239410d012a%40rivosinc.com patch subject: [PATCH v14 22/27] riscv: enable kernel access to shadow stack memory via FWFT sbi call config: riscv-randconfig-002-20250501 (https://download.01.org/0day-ci/archive/20250502/202505020328.CJ8EA6Od-lkp@intel.com/config) compiler: riscv64-linux-gcc (GCC) 14.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250502/202505020328.CJ8EA6Od-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202505020328.CJ8EA6Od-lkp@intel.com/ All errors (new ones prefixed by >>): riscv64-linux-ld: arch/riscv/kernel/head.o: in function `section_table': >> arch/riscv/kernel/head.S:34:(.head.text+0x1126): undefined reference to `riscv_nousercfi' vim +34 arch/riscv/kernel/head.S 76d2a0493a17d4 Palmer Dabbelt 2017-07-10 20 e011995e826f85 Atish Patra 2020-03-17 21 __HEAD 76329c693924d8 Clément Léger 2023-10-24 22 SYM_CODE_START(_start) 0f327f2aaad6a8 Atish Patra 2019-06-06 23 /* 0f327f2aaad6a8 Atish Patra 2019-06-06 24 * Image header expected by Linux boot-loaders. The image header data 0f327f2aaad6a8 Atish Patra 2019-06-06 25 * structure is described in asm/image.h. 0f327f2aaad6a8 Atish Patra 2019-06-06 26 * Do not modify it without modifying the structure and all bootloaders 0f327f2aaad6a8 Atish Patra 2019-06-06 27 * that expects this header format!! 0f327f2aaad6a8 Atish Patra 2019-06-06 28 */ cb7d2dd5612a77 Atish Patra 2020-09-17 29 #ifdef CONFIG_EFI cb7d2dd5612a77 Atish Patra 2020-09-17 30 /* cb7d2dd5612a77 Atish Patra 2020-09-17 31 * This instruction decodes to "MZ" ASCII required by UEFI. cb7d2dd5612a77 Atish Patra 2020-09-17 32 */ cb7d2dd5612a77 Atish Patra 2020-09-17 33 c.li s4,-13 cb7d2dd5612a77 Atish Patra 2020-09-17 @34 j _start_kernel cb7d2dd5612a77 Atish Patra 2020-09-17 35 #else 0f327f2aaad6a8 Atish Patra 2019-06-06 36 /* jump to start kernel */ 0f327f2aaad6a8 Atish Patra 2019-06-06 37 j _start_kernel 0f327f2aaad6a8 Atish Patra 2019-06-06 38 /* reserved */ 0f327f2aaad6a8 Atish Patra 2019-06-06 39 .word 0 cb7d2dd5612a77 Atish Patra 2020-09-17 40 #endif 0f327f2aaad6a8 Atish Patra 2019-06-06 41 .balign 8 79605f13942619 Sean Anderson 2020-10-22 42 #ifdef CONFIG_RISCV_M_MODE 79605f13942619 Sean Anderson 2020-10-22 43 /* Image load offset (0MB) from start of RAM for M-mode */ 79605f13942619 Sean Anderson 2020-10-22 44 .dword 0 79605f13942619 Sean Anderson 2020-10-22 45 #else 0f327f2aaad6a8 Atish Patra 2019-06-06 46 #if __riscv_xlen == 64 0f327f2aaad6a8 Atish Patra 2019-06-06 47 /* Image load offset(2MB) from start of RAM */ 0f327f2aaad6a8 Atish Patra 2019-06-06 48 .dword 0x200000 0f327f2aaad6a8 Atish Patra 2019-06-06 49 #else 0f327f2aaad6a8 Atish Patra 2019-06-06 50 /* Image load offset(4MB) from start of RAM */ 0f327f2aaad6a8 Atish Patra 2019-06-06 51 .dword 0x400000 79605f13942619 Sean Anderson 2020-10-22 52 #endif 0f327f2aaad6a8 Atish Patra 2019-06-06 53 #endif 0f327f2aaad6a8 Atish Patra 2019-06-06 54 /* Effective size of kernel image */ 0f327f2aaad6a8 Atish Patra 2019-06-06 55 .dword _end - _start 0f327f2aaad6a8 Atish Patra 2019-06-06 56 .dword __HEAD_FLAGS 0f327f2aaad6a8 Atish Patra 2019-06-06 57 .word RISCV_HEADER_VERSION 0f327f2aaad6a8 Atish Patra 2019-06-06 58 .word 0 0f327f2aaad6a8 Atish Patra 2019-06-06 59 .dword 0 474efecb65dceb Paul Walmsley 2019-09-13 60 .ascii RISCV_IMAGE_MAGIC 0f327f2aaad6a8 Atish Patra 2019-06-06 61 .balign 4 474efecb65dceb Paul Walmsley 2019-09-13 62 .ascii RISCV_IMAGE_MAGIC2 cb7d2dd5612a77 Atish Patra 2020-09-17 63 #ifdef CONFIG_EFI cb7d2dd5612a77 Atish Patra 2020-09-17 64 .word pe_head_start - _start cb7d2dd5612a77 Atish Patra 2020-09-17 65 pe_head_start: cb7d2dd5612a77 Atish Patra 2020-09-17 66 cb7d2dd5612a77 Atish Patra 2020-09-17 67 __EFI_PE_HEADER cb7d2dd5612a77 Atish Patra 2020-09-17 68 #else 0f327f2aaad6a8 Atish Patra 2019-06-06 69 .word 0 cb7d2dd5612a77 Atish Patra 2020-09-17 70 #endif 0f327f2aaad6a8 Atish Patra 2019-06-06 71 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki