lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202208271810.QCWxkOOc-lkp@intel.com>
Date:   Sat, 27 Aug 2022 18:14:30 +0800
From:   kernel test robot <lkp@...el.com>
To:     Chao Peng <chao.p.peng@...ux.intel.com>
Cc:     kbuild-all@...ts.01.org, linux-kernel@...r.kernel.org,
        Isaku Yamahata <isaku.yamahata@...el.com>
Subject: [intel-tdx:kvm-upstream-workaround 142/314]
 arch/x86/kvm/../../../virt/kvm/kvm_main.c:4971:1: error: label
 'arch_vm_ioctl' defined but not used

tree:   https://github.com/intel/tdx.git kvm-upstream-workaround
head:   552dd80c48f67ca01bcdd10667e0c11efd375177
commit: 303b911206dd2a12b1a4fdee94044dc5a6fa36a3 [142/314] KVM: Register/unregister the guest private memory regions
config: i386-randconfig-a012-20220509 (https://download.01.org/0day-ci/archive/20220827/202208271810.QCWxkOOc-lkp@intel.com/config)
compiler: gcc-11 (Debian 11.3.0-5) 11.3.0
reproduce (this is a W=1 build):
        # https://github.com/intel/tdx/commit/303b911206dd2a12b1a4fdee94044dc5a6fa36a3
        git remote add intel-tdx https://github.com/intel/tdx.git
        git fetch --no-tags intel-tdx kvm-upstream-workaround
        git checkout 303b911206dd2a12b1a4fdee94044dc5a6fa36a3
        # save the config file
        mkdir build_dir && cp config build_dir/.config
        make W=1 O=build_dir ARCH=i386 SHELL=/bin/bash

If you fix the issue, kindly add following tag where applicable
Reported-by: kernel test robot <lkp@...el.com>

All errors (new ones prefixed by >>):

   arch/x86/kvm/../../../virt/kvm/kvm_main.c: In function 'kvm_vm_ioctl':
>> arch/x86/kvm/../../../virt/kvm/kvm_main.c:4971:1: error: label 'arch_vm_ioctl' defined but not used [-Werror=unused-label]
    4971 | arch_vm_ioctl:
         | ^~~~~~~~~~~~~
   cc1: all warnings being treated as errors


vim +/arch_vm_ioctl +4971 arch/x86/kvm/../../../virt/kvm/kvm_main.c

  4747	
  4748	static long kvm_vm_ioctl(struct file *filp,
  4749				   unsigned int ioctl, unsigned long arg)
  4750	{
  4751		struct kvm *kvm = filp->private_data;
  4752		void __user *argp = (void __user *)arg;
  4753		int r;
  4754	
  4755		if (kvm->mm != current->mm || kvm->vm_dead)
  4756			return -EIO;
  4757		switch (ioctl) {
  4758		case KVM_CREATE_VCPU:
  4759			r = kvm_vm_ioctl_create_vcpu(kvm, arg);
  4760			break;
  4761		case KVM_ENABLE_CAP: {
  4762			struct kvm_enable_cap cap;
  4763	
  4764			r = -EFAULT;
  4765			if (copy_from_user(&cap, argp, sizeof(cap)))
  4766				goto out;
  4767			r = kvm_vm_ioctl_enable_cap_generic(kvm, &cap);
  4768			break;
  4769		}
  4770		case KVM_SET_USER_MEMORY_REGION: {
  4771			struct kvm_user_mem_region mem;
  4772			unsigned long size;
  4773			u32 flags;
  4774	
  4775			kvm_sanity_check_user_mem_region_alias();
  4776	
  4777			memset(&mem, 0, sizeof(mem));
  4778	
  4779			r = -EFAULT;
  4780	
  4781			if (get_user(flags,
  4782				(u32 __user *)(argp + offsetof(typeof(mem), flags))))
  4783				goto out;
  4784	
  4785			if (flags & KVM_MEM_PRIVATE) {
  4786				r = -EINVAL;
  4787				goto out;
  4788			}
  4789	
  4790			size = sizeof(struct kvm_userspace_memory_region);
  4791	
  4792			if (copy_from_user(&mem, argp, size))
  4793				goto out;
  4794	
  4795			r = -EINVAL;
  4796			if ((flags ^ mem.flags) & KVM_MEM_PRIVATE)
  4797				goto out;
  4798	
  4799			r = kvm_vm_ioctl_set_memory_region(kvm, &mem);
  4800			break;
  4801		}
  4802	#ifdef CONFIG_HAVE_KVM_PRIVATE_MEM
  4803		case KVM_MEMORY_ENCRYPT_REG_REGION:
  4804		case KVM_MEMORY_ENCRYPT_UNREG_REGION: {
  4805			struct kvm_enc_region region;
  4806	
  4807			if (!kvm_arch_private_mem_supported(kvm))
  4808				goto arch_vm_ioctl;
  4809	
  4810			r = -EFAULT;
  4811			if (copy_from_user(&region, argp, sizeof(region)))
  4812				goto out;
  4813	
  4814			r = kvm_vm_ioctl_set_encrypted_region(kvm, ioctl, &region);
  4815			break;
  4816		}
  4817	#endif
  4818		case KVM_GET_DIRTY_LOG: {
  4819			struct kvm_dirty_log log;
  4820	
  4821			r = -EFAULT;
  4822			if (copy_from_user(&log, argp, sizeof(log)))
  4823				goto out;
  4824			r = kvm_vm_ioctl_get_dirty_log(kvm, &log);
  4825			break;
  4826		}
  4827	#ifdef CONFIG_KVM_GENERIC_DIRTYLOG_READ_PROTECT
  4828		case KVM_CLEAR_DIRTY_LOG: {
  4829			struct kvm_clear_dirty_log log;
  4830	
  4831			r = -EFAULT;
  4832			if (copy_from_user(&log, argp, sizeof(log)))
  4833				goto out;
  4834			r = kvm_vm_ioctl_clear_dirty_log(kvm, &log);
  4835			break;
  4836		}
  4837	#endif
  4838	#ifdef CONFIG_KVM_MMIO
  4839		case KVM_REGISTER_COALESCED_MMIO: {
  4840			struct kvm_coalesced_mmio_zone zone;
  4841	
  4842			r = -EFAULT;
  4843			if (copy_from_user(&zone, argp, sizeof(zone)))
  4844				goto out;
  4845			r = kvm_vm_ioctl_register_coalesced_mmio(kvm, &zone);
  4846			break;
  4847		}
  4848		case KVM_UNREGISTER_COALESCED_MMIO: {
  4849			struct kvm_coalesced_mmio_zone zone;
  4850	
  4851			r = -EFAULT;
  4852			if (copy_from_user(&zone, argp, sizeof(zone)))
  4853				goto out;
  4854			r = kvm_vm_ioctl_unregister_coalesced_mmio(kvm, &zone);
  4855			break;
  4856		}
  4857	#endif
  4858		case KVM_IRQFD: {
  4859			struct kvm_irqfd data;
  4860	
  4861			r = -EFAULT;
  4862			if (copy_from_user(&data, argp, sizeof(data)))
  4863				goto out;
  4864			r = kvm_irqfd(kvm, &data);
  4865			break;
  4866		}
  4867		case KVM_IOEVENTFD: {
  4868			struct kvm_ioeventfd data;
  4869	
  4870			r = -EFAULT;
  4871			if (copy_from_user(&data, argp, sizeof(data)))
  4872				goto out;
  4873			r = kvm_ioeventfd(kvm, &data);
  4874			break;
  4875		}
  4876	#ifdef CONFIG_HAVE_KVM_MSI
  4877		case KVM_SIGNAL_MSI: {
  4878			struct kvm_msi msi;
  4879	
  4880			r = -EFAULT;
  4881			if (copy_from_user(&msi, argp, sizeof(msi)))
  4882				goto out;
  4883			r = kvm_send_userspace_msi(kvm, &msi);
  4884			break;
  4885		}
  4886	#endif
  4887	#ifdef __KVM_HAVE_IRQ_LINE
  4888		case KVM_IRQ_LINE_STATUS:
  4889		case KVM_IRQ_LINE: {
  4890			struct kvm_irq_level irq_event;
  4891	
  4892			r = -EFAULT;
  4893			if (copy_from_user(&irq_event, argp, sizeof(irq_event)))
  4894				goto out;
  4895	
  4896			r = kvm_vm_ioctl_irq_line(kvm, &irq_event,
  4897						ioctl == KVM_IRQ_LINE_STATUS);
  4898			if (r)
  4899				goto out;
  4900	
  4901			r = -EFAULT;
  4902			if (ioctl == KVM_IRQ_LINE_STATUS) {
  4903				if (copy_to_user(argp, &irq_event, sizeof(irq_event)))
  4904					goto out;
  4905			}
  4906	
  4907			r = 0;
  4908			break;
  4909		}
  4910	#endif
  4911	#ifdef CONFIG_HAVE_KVM_IRQ_ROUTING
  4912		case KVM_SET_GSI_ROUTING: {
  4913			struct kvm_irq_routing routing;
  4914			struct kvm_irq_routing __user *urouting;
  4915			struct kvm_irq_routing_entry *entries = NULL;
  4916	
  4917			r = -EFAULT;
  4918			if (copy_from_user(&routing, argp, sizeof(routing)))
  4919				goto out;
  4920			r = -EINVAL;
  4921			if (!kvm_arch_can_set_irq_routing(kvm))
  4922				goto out;
  4923			if (routing.nr > KVM_MAX_IRQ_ROUTES)
  4924				goto out;
  4925			if (routing.flags)
  4926				goto out;
  4927			if (routing.nr) {
  4928				urouting = argp;
  4929				entries = vmemdup_user(urouting->entries,
  4930						       array_size(sizeof(*entries),
  4931								  routing.nr));
  4932				if (IS_ERR(entries)) {
  4933					r = PTR_ERR(entries);
  4934					goto out;
  4935				}
  4936			}
  4937			r = kvm_set_irq_routing(kvm, entries, routing.nr,
  4938						routing.flags);
  4939			kvfree(entries);
  4940			break;
  4941		}
  4942	#endif /* CONFIG_HAVE_KVM_IRQ_ROUTING */
  4943		case KVM_CREATE_DEVICE: {
  4944			struct kvm_create_device cd;
  4945	
  4946			r = -EFAULT;
  4947			if (copy_from_user(&cd, argp, sizeof(cd)))
  4948				goto out;
  4949	
  4950			r = kvm_ioctl_create_device(kvm, &cd);
  4951			if (r)
  4952				goto out;
  4953	
  4954			r = -EFAULT;
  4955			if (copy_to_user(argp, &cd, sizeof(cd)))
  4956				goto out;
  4957	
  4958			r = 0;
  4959			break;
  4960		}
  4961		case KVM_CHECK_EXTENSION:
  4962			r = kvm_vm_ioctl_check_extension_generic(kvm, arg);
  4963			break;
  4964		case KVM_RESET_DIRTY_RINGS:
  4965			r = kvm_vm_ioctl_reset_dirty_pages(kvm);
  4966			break;
  4967		case KVM_GET_STATS_FD:
  4968			r = kvm_vm_ioctl_get_stats_fd(kvm);
  4969			break;
  4970		default:
> 4971	arch_vm_ioctl:
  4972			r = kvm_arch_vm_ioctl(filp, ioctl, arg);
  4973		}
  4974	out:
  4975		return r;
  4976	}
  4977	

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ