lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <202408152054.7LIuKvYe-lkp@intel.com>
Date: Thu, 15 Aug 2024 20:51:22 +0800
From: kernel test robot <lkp@...el.com>
To: Alexey Makhalov <alexey.makhalov@...adcom.com>,
	linux-kernel@...r.kernel.org, virtualization@...ts.linux.dev,
	bp@...en8.de, hpa@...or.com, dave.hansen@...ux.intel.com,
	mingo@...hat.com, tglx@...utronix.de
Cc: oe-kbuild-all@...ts.linux.dev, x86@...nel.org, ajay.kaher@...adcom.com,
	bo.gan@...adcom.com, bcm-kernel-feedback-list@...adcom.com,
	Alexey Makhalov <alexey.makhalov@...adcom.com>
Subject: Re: [PATCH 2/2] x86/vmware: Fix steal time clock under SEV

Hi Alexey,

kernel test robot noticed the following build errors:

[auto build test ERROR on tip/x86/vmware]
[also build test ERROR on linus/master v6.11-rc3 next-20240815]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch#_base_tree_information]

url:    https://github.com/intel-lab-lkp/linux/commits/Alexey-Makhalov/x86-vmware-Fix-steal-time-clock-under-SEV/20240815-050918
base:   tip/x86/vmware
patch link:    https://lore.kernel.org/r/20240814210731.761010-2-alexey.makhalov%40broadcom.com
patch subject: [PATCH 2/2] x86/vmware: Fix steal time clock under SEV
config: i386-randconfig-001-20240815 (https://download.01.org/0day-ci/archive/20240815/202408152054.7LIuKvYe-lkp@intel.com/config)
compiler: gcc-12 (Debian 12.2.0-14) 12.2.0
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240815/202408152054.7LIuKvYe-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202408152054.7LIuKvYe-lkp@intel.com/

All errors (new ones prefixed by >>):

   arch/x86/kernel/cpu/vmware.c: In function 'sev_map_percpu_data':
>> arch/x86/kernel/cpu/vmware.c:313:13: error: 'cc_vendor' undeclared (first use in this function)
     313 |         if (cc_vendor != CC_VENDOR_AMD ||
         |             ^~~~~~~~~
   arch/x86/kernel/cpu/vmware.c:313:13: note: each undeclared identifier is reported only once for each function it appears in
>> arch/x86/kernel/cpu/vmware.c:313:26: error: 'CC_VENDOR_AMD' undeclared (first use in this function); did you mean 'X86_VENDOR_AMD'?
     313 |         if (cc_vendor != CC_VENDOR_AMD ||
         |                          ^~~~~~~~~~~~~
         |                          X86_VENDOR_AMD


vim +/cc_vendor +313 arch/x86/kernel/cpu/vmware.c

   308	
   309	static void __init sev_map_percpu_data(void)
   310	{
   311		int cpu;
   312	
 > 313		if (cc_vendor != CC_VENDOR_AMD ||
   314		    !cc_platform_has(CC_ATTR_GUEST_MEM_ENCRYPT))
   315			return;
   316	
   317		for_each_possible_cpu(cpu) {
   318			early_set_memory_decrypted(
   319				(unsigned long)&per_cpu(vmw_steal_time, cpu),
   320				sizeof(vmw_steal_time));
   321		}
   322	}
   323	

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ