From: kernel test robot <lkp@intel.com>
To: Fuad Tabba <tabba@google.com>, kvmarm@lists.cs.columbia.edu
Cc: kbuild-all@lists.01.org, maz@kernel.org, pbonzini@redhat.com,
will@kernel.org
Subject: Re: [PATCH v4 14/15] KVM: arm64: Trap access to pVM restricted features
Date: Wed, 18 Aug 2021 05:30:41 +0800 [thread overview]
Message-ID: <202108180511.zPOeXJib-lkp@intel.com> (raw)
In-Reply-To: <20210817081134.2918285-15-tabba@google.com>
[-- Attachment #1: Type: text/plain, Size: 10476 bytes --]
Hi Fuad,
Thank you for the patch! Perhaps something to improve:
[auto build test WARNING on c500bee1c5b2f1d59b1081ac879d73268ab0ff17]
url: https://github.com/0day-ci/linux/commits/Fuad-Tabba/KVM-arm64-Fixed-features-for-protected-VMs/20210817-161500
base: c500bee1c5b2f1d59b1081ac879d73268ab0ff17
config: arm64-allyesconfig (attached as .config)
compiler: aarch64-linux-gcc (GCC) 11.2.0
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# https://github.com/0day-ci/linux/commit/c05d33084d216fbdd94a7165aa6e93fd7517e0d8
git remote add linux-review https://github.com/0day-ci/linux
git fetch --no-tags linux-review Fuad-Tabba/KVM-arm64-Fixed-features-for-protected-VMs/20210817-161500
git checkout c05d33084d216fbdd94a7165aa6e93fd7517e0d8
# save the attached .config to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-11.2.0 make.cross ARCH=arm64
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
All warnings (new ones prefixed by >>):
In file included from include/uapi/linux/posix_types.h:5,
from include/uapi/linux/types.h:14,
from include/linux/types.h:6,
from include/linux/kvm_host.h:6,
from arch/arm64/include/asm/kvm_emulate.h:14,
from arch/arm64/kvm/hyp/include/hyp/adjust_pc.h:13,
from arch/arm64/kvm/hyp/include/hyp/switch.h:10,
from arch/arm64/kvm/hyp/nvhe/switch.c:7:
include/linux/stddef.h:8:14: warning: initialized field overwritten [-Woverride-init]
8 | #define NULL ((void *)0)
| ^
arch/arm64/kvm/hyp/nvhe/switch.c:163:43: note: in expansion of macro 'NULL'
163 | [ESR_ELx_EC_WFx] = NULL,
| ^~~~
include/linux/stddef.h:8:14: note: (near initialization for 'hyp_exit_handlers[1]')
8 | #define NULL ((void *)0)
| ^
arch/arm64/kvm/hyp/nvhe/switch.c:163:43: note: in expansion of macro 'NULL'
163 | [ESR_ELx_EC_WFx] = NULL,
| ^~~~
>> arch/arm64/kvm/hyp/nvhe/switch.c:164:43: warning: initialized field overwritten [-Woverride-init]
164 | [ESR_ELx_EC_CP15_32] = kvm_handle_pvm_restricted,
| ^~~~~~~~~~~~~~~~~~~~~~~~~
arch/arm64/kvm/hyp/nvhe/switch.c:164:43: note: (near initialization for 'hyp_exit_handlers[3]')
arch/arm64/kvm/hyp/nvhe/switch.c:165:43: warning: initialized field overwritten [-Woverride-init]
165 | [ESR_ELx_EC_CP15_64] = kvm_handle_pvm_restricted,
| ^~~~~~~~~~~~~~~~~~~~~~~~~
arch/arm64/kvm/hyp/nvhe/switch.c:165:43: note: (near initialization for 'hyp_exit_handlers[4]')
arch/arm64/kvm/hyp/nvhe/switch.c:166:43: warning: initialized field overwritten [-Woverride-init]
166 | [ESR_ELx_EC_CP14_MR] = kvm_handle_pvm_restricted,
| ^~~~~~~~~~~~~~~~~~~~~~~~~
arch/arm64/kvm/hyp/nvhe/switch.c:166:43: note: (near initialization for 'hyp_exit_handlers[5]')
arch/arm64/kvm/hyp/nvhe/switch.c:167:43: warning: initialized field overwritten [-Woverride-init]
167 | [ESR_ELx_EC_CP14_LS] = kvm_handle_pvm_restricted,
| ^~~~~~~~~~~~~~~~~~~~~~~~~
arch/arm64/kvm/hyp/nvhe/switch.c:167:43: note: (near initialization for 'hyp_exit_handlers[6]')
arch/arm64/kvm/hyp/nvhe/switch.c:168:43: warning: initialized field overwritten [-Woverride-init]
168 | [ESR_ELx_EC_CP14_64] = kvm_handle_pvm_restricted,
| ^~~~~~~~~~~~~~~~~~~~~~~~~
arch/arm64/kvm/hyp/nvhe/switch.c:168:43: note: (near initialization for 'hyp_exit_handlers[12]')
In file included from include/uapi/linux/posix_types.h:5,
from include/uapi/linux/types.h:14,
from include/linux/types.h:6,
from include/linux/kvm_host.h:6,
from arch/arm64/include/asm/kvm_emulate.h:14,
from arch/arm64/kvm/hyp/include/hyp/adjust_pc.h:13,
from arch/arm64/kvm/hyp/include/hyp/switch.h:10,
from arch/arm64/kvm/hyp/nvhe/switch.c:7:
include/linux/stddef.h:8:14: warning: initialized field overwritten [-Woverride-init]
8 | #define NULL ((void *)0)
| ^
arch/arm64/kvm/hyp/nvhe/switch.c:169:43: note: in expansion of macro 'NULL'
169 | [ESR_ELx_EC_HVC32] = NULL,
| ^~~~
include/linux/stddef.h:8:14: note: (near initialization for 'hyp_exit_handlers[18]')
8 | #define NULL ((void *)0)
| ^
arch/arm64/kvm/hyp/nvhe/switch.c:169:43: note: in expansion of macro 'NULL'
169 | [ESR_ELx_EC_HVC32] = NULL,
| ^~~~
include/linux/stddef.h:8:14: warning: initialized field overwritten [-Woverride-init]
8 | #define NULL ((void *)0)
| ^
arch/arm64/kvm/hyp/nvhe/switch.c:170:43: note: in expansion of macro 'NULL'
170 | [ESR_ELx_EC_SMC32] = NULL,
| ^~~~
include/linux/stddef.h:8:14: note: (near initialization for 'hyp_exit_handlers[19]')
8 | #define NULL ((void *)0)
| ^
arch/arm64/kvm/hyp/nvhe/switch.c:170:43: note: in expansion of macro 'NULL'
170 | [ESR_ELx_EC_SMC32] = NULL,
| ^~~~
include/linux/stddef.h:8:14: warning: initialized field overwritten [-Woverride-init]
8 | #define NULL ((void *)0)
| ^
arch/arm64/kvm/hyp/nvhe/switch.c:171:43: note: in expansion of macro 'NULL'
171 | [ESR_ELx_EC_HVC64] = NULL,
| ^~~~
include/linux/stddef.h:8:14: note: (near initialization for 'hyp_exit_handlers[22]')
8 | #define NULL ((void *)0)
| ^
arch/arm64/kvm/hyp/nvhe/switch.c:171:43: note: in expansion of macro 'NULL'
171 | [ESR_ELx_EC_HVC64] = NULL,
| ^~~~
include/linux/stddef.h:8:14: warning: initialized field overwritten [-Woverride-init]
8 | #define NULL ((void *)0)
| ^
arch/arm64/kvm/hyp/nvhe/switch.c:172:43: note: in expansion of macro 'NULL'
172 | [ESR_ELx_EC_SMC64] = NULL,
| ^~~~
include/linux/stddef.h:8:14: note: (near initialization for 'hyp_exit_handlers[23]')
8 | #define NULL ((void *)0)
| ^
arch/arm64/kvm/hyp/nvhe/switch.c:172:43: note: in expansion of macro 'NULL'
172 | [ESR_ELx_EC_SMC64] = NULL,
| ^~~~
arch/arm64/kvm/hyp/nvhe/switch.c:173:43: warning: initialized field overwritten [-Woverride-init]
173 | [ESR_ELx_EC_SYS64] = kvm_handle_pvm_sys64,
| ^~~~~~~~~~~~~~~~~~~~
arch/arm64/kvm/hyp/nvhe/switch.c:173:43: note: (near initialization for 'hyp_exit_handlers[24]')
arch/arm64/kvm/hyp/nvhe/switch.c:174:43: warning: initialized field overwritten [-Woverride-init]
174 | [ESR_ELx_EC_SVE] = kvm_handle_pvm_restricted,
| ^~~~~~~~~~~~~~~~~~~~~~~~~
arch/arm64/kvm/hyp/nvhe/switch.c:174:43: note: (near initialization for 'hyp_exit_handlers[25]')
In file included from include/uapi/linux/posix_types.h:5,
from include/uapi/linux/types.h:14,
from include/linux/types.h:6,
from include/linux/kvm_host.h:6,
from arch/arm64/include/asm/kvm_emulate.h:14,
from arch/arm64/kvm/hyp/include/hyp/adjust_pc.h:13,
from arch/arm64/kvm/hyp/include/hyp/switch.h:10,
from arch/arm64/kvm/hyp/nvhe/switch.c:7:
include/linux/stddef.h:8:14: warning: initialized field overwritten [-Woverride-init]
8 | #define NULL ((void *)0)
| ^
arch/arm64/kvm/hyp/nvhe/switch.c:175:43: note: in expansion of macro 'NULL'
175 | [ESR_ELx_EC_IABT_LOW] = NULL,
| ^~~~
include/linux/stddef.h:8:14: note: (near initialization for 'hyp_exit_handlers[32]')
8 | #define NULL ((void *)0)
| ^
vim +164 arch/arm64/kvm/hyp/nvhe/switch.c
160
161 static exit_handle_fn hyp_exit_handlers[] = {
162 [0 ... ESR_ELx_EC_MAX] = kvm_handle_pvm_restricted,
> 163 [ESR_ELx_EC_WFx] = NULL,
> 164 [ESR_ELx_EC_CP15_32] = kvm_handle_pvm_restricted,
165 [ESR_ELx_EC_CP15_64] = kvm_handle_pvm_restricted,
166 [ESR_ELx_EC_CP14_MR] = kvm_handle_pvm_restricted,
167 [ESR_ELx_EC_CP14_LS] = kvm_handle_pvm_restricted,
168 [ESR_ELx_EC_CP14_64] = kvm_handle_pvm_restricted,
169 [ESR_ELx_EC_HVC32] = NULL,
170 [ESR_ELx_EC_SMC32] = NULL,
171 [ESR_ELx_EC_HVC64] = NULL,
172 [ESR_ELx_EC_SMC64] = NULL,
173 [ESR_ELx_EC_SYS64] = kvm_handle_pvm_sys64,
174 [ESR_ELx_EC_SVE] = kvm_handle_pvm_restricted,
175 [ESR_ELx_EC_IABT_LOW] = NULL,
176 [ESR_ELx_EC_DABT_LOW] = NULL,
177 [ESR_ELx_EC_SOFTSTP_LOW] = kvm_handle_pvm_restricted,
178 [ESR_ELx_EC_WATCHPT_LOW] = kvm_handle_pvm_restricted,
179 [ESR_ELx_EC_BREAKPT_LOW] = kvm_handle_pvm_restricted,
180 [ESR_ELx_EC_BKPT32] = kvm_handle_pvm_restricted,
181 [ESR_ELx_EC_BRK64] = kvm_handle_pvm_restricted,
182 [ESR_ELx_EC_FP_ASIMD] = kvm_handle_pvm_restricted,
183 [ESR_ELx_EC_PAC] = NULL,
184 };
185
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org
[-- Attachment #2: .config.gz --]
[-- Type: application/gzip, Size: 77923 bytes --]
[-- Attachment #3: Type: text/plain, Size: 151 bytes --]
_______________________________________________
kvmarm mailing list
kvmarm@lists.cs.columbia.edu
https://lists.cs.columbia.edu/mailman/listinfo/kvmarm
next prev parent reply other threads:[~2021-08-17 21:31 UTC|newest]
Thread overview: 34+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-08-17 8:11 [PATCH v4 00/15] KVM: arm64: Fixed features for protected VMs Fuad Tabba
2021-08-17 8:11 ` [PATCH v4 01/15] KVM: arm64: placeholder to check if VM is protected Fuad Tabba
2021-08-17 8:11 ` [PATCH v4 02/15] KVM: arm64: Remove trailing whitespace in comment Fuad Tabba
2021-08-17 8:11 ` [PATCH v4 03/15] KVM: arm64: MDCR_EL2 is a 64-bit register Fuad Tabba
2021-08-18 14:32 ` Marc Zyngier
2021-08-17 8:11 ` [PATCH v4 04/15] KVM: arm64: Fix names of config register fields Fuad Tabba
2021-08-17 8:11 ` [PATCH v4 05/15] KVM: arm64: Refactor sys_regs.h,c for nVHE reuse Fuad Tabba
2021-08-17 8:11 ` [PATCH v4 06/15] KVM: arm64: Restore mdcr_el2 from vcpu Fuad Tabba
2021-08-18 13:13 ` Will Deacon
2021-08-18 14:42 ` Marc Zyngier
2021-08-17 8:11 ` [PATCH v4 07/15] KVM: arm64: Keep mdcr_el2's value as set by __init_el2_debug Fuad Tabba
2021-08-18 13:17 ` Will Deacon
2021-08-17 8:11 ` [PATCH v4 08/15] KVM: arm64: Track value of cptr_el2 in struct kvm_vcpu_arch Fuad Tabba
2021-08-17 8:11 ` [PATCH v4 09/15] KVM: arm64: Add feature register flag definitions Fuad Tabba
2021-08-18 13:21 ` Will Deacon
2021-08-17 8:11 ` [PATCH v4 10/15] KVM: arm64: Add config register bit definitions Fuad Tabba
2021-08-18 15:16 ` Marc Zyngier
2021-08-17 8:11 ` [PATCH v4 11/15] KVM: arm64: Guest exit handlers for nVHE hyp Fuad Tabba
2021-08-17 17:11 ` kernel test robot
2021-08-18 16:45 ` Marc Zyngier
2021-08-19 14:35 ` Marc Zyngier
2021-08-23 10:21 ` Fuad Tabba
2021-08-23 12:10 ` Marc Zyngier
2021-08-17 8:11 ` [PATCH v4 12/15] KVM: arm64: Add trap handlers for protected VMs Fuad Tabba
2021-08-17 16:43 ` kernel test robot
2021-08-17 18:04 ` kernel test robot
2021-08-17 8:11 ` [PATCH v4 13/15] KVM: arm64: Move sanitized copies of CPU features Fuad Tabba
2021-08-17 8:11 ` [PATCH v4 14/15] KVM: arm64: Trap access to pVM restricted features Fuad Tabba
2021-08-17 21:30 ` kernel test robot [this message]
2021-08-17 8:11 ` [PATCH v4 15/15] KVM: arm64: Handle protected guests at 32 bits Fuad Tabba
2021-08-19 8:10 ` Oliver Upton
2021-08-23 10:25 ` Fuad Tabba
2021-08-20 10:34 ` [PATCH v4 00/15] KVM: arm64: Fixed features for protected VMs Marc Zyngier
2021-08-23 10:23 ` Fuad Tabba
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=202108180511.zPOeXJib-lkp@intel.com \
--to=lkp@intel.com \
--cc=kbuild-all@lists.01.org \
--cc=kvmarm@lists.cs.columbia.edu \
--cc=maz@kernel.org \
--cc=pbonzini@redhat.com \
--cc=tabba@google.com \
--cc=will@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox