lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202203020008.SIGKbNCs-lkp@intel.com>
Date:   Wed, 2 Mar 2022 00:37:10 +0800
From:   kernel test robot <lkp@...el.com>
To:     "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>
Cc:     kbuild-all@...ts.01.org, linux-kernel@...r.kernel.org,
        Isaku Yamahata <isaku.yamahata@...el.com>
Subject: [intel-tdx:kvm-upstream-workaround 91/284]
 arch/x86/kernel/cpu/mshyperv.c:349: undefined reference to `cc_init'

tree:   https://github.com/intel/tdx.git kvm-upstream-workaround
head:   f6d152644b6c7b3d6786075dcf924402e4d3f66a
commit: cbb5c73599cf1d3d27f675c38e8f078accc4665e [91/284] x86/coco: Add API to handle encryption mask
config: i386-randconfig-a005 (https://download.01.org/0day-ci/archive/20220302/202203020008.SIGKbNCs-lkp@intel.com/config)
compiler: gcc-9 (Debian 9.3.0-22) 9.3.0
reproduce (this is a W=1 build):
        # https://github.com/intel/tdx/commit/cbb5c73599cf1d3d27f675c38e8f078accc4665e
        git remote add intel-tdx https://github.com/intel/tdx.git
        git fetch --no-tags intel-tdx kvm-upstream-workaround
        git checkout cbb5c73599cf1d3d27f675c38e8f078accc4665e
        # save the config file to linux build tree
        mkdir build_dir
        make W=1 O=build_dir ARCH=i386 SHELL=/bin/bash

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@...el.com>

All errors (new ones prefixed by >>):

   ld: arch/x86/kernel/cpu/mshyperv.o: in function `ms_hyperv_init_platform':
>> arch/x86/kernel/cpu/mshyperv.c:349: undefined reference to `cc_init'


vim +349 arch/x86/kernel/cpu/mshyperv.c

   267	
   268		/*
   269		 * Extract the features and hints
   270		 */
   271		ms_hyperv.features = cpuid_eax(HYPERV_CPUID_FEATURES);
   272		ms_hyperv.priv_high = cpuid_ebx(HYPERV_CPUID_FEATURES);
   273		ms_hyperv.misc_features = cpuid_edx(HYPERV_CPUID_FEATURES);
   274		ms_hyperv.hints    = cpuid_eax(HYPERV_CPUID_ENLIGHTMENT_INFO);
   275	
   276		hv_max_functions_eax = cpuid_eax(HYPERV_CPUID_VENDOR_AND_MAX_FUNCTIONS);
   277	
   278		pr_info("Hyper-V: privilege flags low 0x%x, high 0x%x, hints 0x%x, misc 0x%x\n",
   279			ms_hyperv.features, ms_hyperv.priv_high, ms_hyperv.hints,
   280			ms_hyperv.misc_features);
   281	
   282		ms_hyperv.max_vp_index = cpuid_eax(HYPERV_CPUID_IMPLEMENT_LIMITS);
   283		ms_hyperv.max_lp_index = cpuid_ebx(HYPERV_CPUID_IMPLEMENT_LIMITS);
   284	
   285		pr_debug("Hyper-V: max %u virtual processors, %u logical processors\n",
   286			 ms_hyperv.max_vp_index, ms_hyperv.max_lp_index);
   287	
   288		/*
   289		 * Check CPU management privilege.
   290		 *
   291		 * To mirror what Windows does we should extract CPU management
   292		 * features and use the ReservedIdentityBit to detect if Linux is the
   293		 * root partition. But that requires negotiating CPU management
   294		 * interface (a process to be finalized).
   295		 *
   296		 * For now, use the privilege flag as the indicator for running as
   297		 * root.
   298		 */
   299		if (cpuid_ebx(HYPERV_CPUID_FEATURES) & HV_CPU_MANAGEMENT) {
   300			hv_root_partition = true;
   301			pr_info("Hyper-V: running as root partition\n");
   302		}
   303	
   304		/*
   305		 * Extract host information.
   306		 */
   307		if (hv_max_functions_eax >= HYPERV_CPUID_VERSION) {
   308			hv_host_info_eax = cpuid_eax(HYPERV_CPUID_VERSION);
   309			hv_host_info_ebx = cpuid_ebx(HYPERV_CPUID_VERSION);
   310			hv_host_info_ecx = cpuid_ecx(HYPERV_CPUID_VERSION);
   311			hv_host_info_edx = cpuid_edx(HYPERV_CPUID_VERSION);
   312	
   313			pr_info("Hyper-V Host Build:%d-%d.%d-%d-%d.%d\n",
   314				hv_host_info_eax, hv_host_info_ebx >> 16,
   315				hv_host_info_ebx & 0xFFFF, hv_host_info_ecx,
   316				hv_host_info_edx >> 24, hv_host_info_edx & 0xFFFFFF);
   317		}
   318	
   319		if (ms_hyperv.features & HV_ACCESS_FREQUENCY_MSRS &&
   320		    ms_hyperv.misc_features & HV_FEATURE_FREQUENCY_MSRS_AVAILABLE) {
   321			x86_platform.calibrate_tsc = hv_get_tsc_khz;
   322			x86_platform.calibrate_cpu = hv_get_tsc_khz;
   323		}
   324	
   325		if (ms_hyperv.priv_high & HV_ISOLATION) {
   326			ms_hyperv.isolation_config_a = cpuid_eax(HYPERV_CPUID_ISOLATION_CONFIG);
   327			ms_hyperv.isolation_config_b = cpuid_ebx(HYPERV_CPUID_ISOLATION_CONFIG);
   328			ms_hyperv.shared_gpa_boundary =
   329				BIT_ULL(ms_hyperv.shared_gpa_boundary_bits);
   330	
   331			pr_info("Hyper-V: Isolation Config: Group A 0x%x, Group B 0x%x\n",
   332				ms_hyperv.isolation_config_a, ms_hyperv.isolation_config_b);
   333	
   334			if (hv_get_isolation_type() == HV_ISOLATION_TYPE_SNP) {
   335				static_branch_enable(&isolation_type_snp);
   336	#ifdef CONFIG_SWIOTLB
   337				swiotlb_unencrypted_base = ms_hyperv.shared_gpa_boundary;
   338	#endif
   339			}
   340	
   341	#ifdef CONFIG_SWIOTLB
   342			/*
   343			 * Enable swiotlb force mode in Isolation VM to
   344			 * use swiotlb bounce buffer for dma transaction.
   345			 */
   346			swiotlb_force = SWIOTLB_FORCE;
   347	#endif
   348			if (hv_get_isolation_type() != HV_ISOLATION_TYPE_NONE)
 > 349				cc_init(CC_VENDOR_HYPERV, 0);
   350		}
   351	
   352		if (hv_max_functions_eax >= HYPERV_CPUID_NESTED_FEATURES) {
   353			ms_hyperv.nested_features =
   354				cpuid_eax(HYPERV_CPUID_NESTED_FEATURES);
   355			pr_info("Hyper-V: Nested features: 0x%x\n",
   356				ms_hyperv.nested_features);
   357		}
   358	

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ