From mboxrd@z Thu Jan 1 00:00:00 1970 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="RS93XSkX" Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.151]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8E736CA; Mon, 20 Nov 2023 13:38:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1700516306; x=1732052306; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=o3m56hl+JqpBTbDARZLvzqTO79AW8kpf8jC8GzCYZig=; b=RS93XSkXyuwIyOF/zDrhESMWJysdcRIIN4WI227fOSZMlJpD0F8DyGQS WX6dppZdSAHPmarIO0KvjgdKPtVZnirJFEcR61/5NjnC59RXuzpQB8Ys9 np/l5BXEa48ZOFcpIrbe6KGrfcoEdPAAnN6zjptWwcA0aOKBpXHjaBMH/ /oxyGQ8wOGNaZw1Tk73CJUzyxkti10yRGOArsxIIRbhLWAeoeN86BXowv 1KfnN7QR9yi2P8TeQrFSGLg/x04fSg31zsp5K2IXjkvymgWB2DXmkm/lm ErfWB912pvBNH9xN44a/qAUsgAVrI2gmZYU4P+DU87kKJ5P4bxlUiiqfP Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10900"; a="371886532" X-IronPort-AV: E=Sophos;i="6.04,214,1695711600"; d="scan'208";a="371886532" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Nov 2023 13:38:19 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10900"; a="890056312" X-IronPort-AV: E=Sophos;i="6.04,214,1695711600"; d="scan'208";a="890056312" Received: from lkp-server02.sh.intel.com (HELO b8de5498638e) ([10.239.97.151]) by orsmga004.jf.intel.com with ESMTP; 20 Nov 2023 13:38:11 -0800 Received: from kbuild by b8de5498638e with local (Exim 4.96) (envelope-from ) id 1r5By4-0006wq-2K; Mon, 20 Nov 2023 21:38:08 +0000 Date: Tue, 21 Nov 2023 05:38:03 +0800 From: kernel test robot To: Valentin Schneider , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-arch@vger.kernel.org, x86@kernel.org Cc: oe-kbuild-all@lists.linux.dev, Peter Zijlstra , Thomas Gleixner , Borislav Petkov , Josh Poimboeuf , Pawan Gupta , Ingo Molnar , Dave Hansen , "H. Peter Anvin" , Paolo Bonzini , Wanpeng Li , Vitaly Kuznetsov , Arnd Bergmann , Jason Baron , Steven Rostedt , Ard Biesheuvel , Frederic Weisbecker , "Paul E. McKenney" , Feng Tang , Andrew Morton , Linux Memory Management List , "Mike Rapoport (IBM)" , Vlastimil Babka , David Hildenbrand , "ndesaulniers@google.com" , Michael Kelley , "Masami Hiramatsu (Google)" Subject: Re: [PATCH 1/5] jump_label,module: Don't alloc static_key_mod for __ro_after_init keys Message-ID: <202311210541.RAdnu4yL-lkp@intel.com> References: <20231120105528.760306-2-vschneid@redhat.com> Precedence: bulk X-Mailing-List: linux-arch@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231120105528.760306-2-vschneid@redhat.com> Hi Valentin, kernel test robot noticed the following build errors: [auto build test ERROR on tip/x86/core] [also build test ERROR on linus/master v6.7-rc2 next-20231120] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Valentin-Schneider/jump_label-module-Don-t-alloc-static_key_mod-for-__ro_after_init-keys/20231120-190044 base: tip/x86/core patch link: https://lore.kernel.org/r/20231120105528.760306-2-vschneid%40redhat.com patch subject: [PATCH 1/5] jump_label,module: Don't alloc static_key_mod for __ro_after_init keys config: s390-allnoconfig (https://download.01.org/0day-ci/archive/20231121/202311210541.RAdnu4yL-lkp@intel.com/config) compiler: s390-linux-gcc (GCC) 13.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231121/202311210541.RAdnu4yL-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202311210541.RAdnu4yL-lkp@intel.com/ All errors (new ones prefixed by >>): init/main.c: In function 'mark_readonly': >> init/main.c:1406:17: error: implicit declaration of function 'jump_label_ro'; did you mean 'jump_label_lock'? [-Werror=implicit-function-declaration] 1406 | jump_label_ro(); | ^~~~~~~~~~~~~ | jump_label_lock cc1: some warnings being treated as errors vim +1406 init/main.c 1394 1395 #ifdef CONFIG_STRICT_KERNEL_RWX 1396 static void mark_readonly(void) 1397 { 1398 if (rodata_enabled) { 1399 /* 1400 * load_module() results in W+X mappings, which are cleaned 1401 * up with call_rcu(). Let's make sure that queued work is 1402 * flushed so that we don't hit false positives looking for 1403 * insecure pages which are W+X. 1404 */ 1405 rcu_barrier(); > 1406 jump_label_ro(); 1407 mark_rodata_ro(); 1408 rodata_test(); 1409 } else 1410 pr_info("Kernel memory protection disabled.\n"); 1411 } 1412 #elif defined(CONFIG_ARCH_HAS_STRICT_KERNEL_RWX) 1413 static inline void mark_readonly(void) 1414 { 1415 pr_warn("Kernel memory protection not selected by kernel config.\n"); 1416 } 1417 #else 1418 static inline void mark_readonly(void) 1419 { 1420 pr_warn("This architecture does not have kernel memory protection.\n"); 1421 } 1422 #endif 1423 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki