From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 26CFCC3DA42 for ; Sun, 14 Jul 2024 05:03:13 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 37B756B007B; Sun, 14 Jul 2024 01:03:13 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 32BD96B0083; Sun, 14 Jul 2024 01:03:13 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 1CC326B0085; Sun, 14 Jul 2024 01:03:13 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id F323C6B007B for ; Sun, 14 Jul 2024 01:03:12 -0400 (EDT) Received: from smtpin24.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id 42EC81C12FF for ; Sun, 14 Jul 2024 05:03:12 +0000 (UTC) X-FDA: 82337164224.24.D7EDB79 Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.9]) by imf27.hostedemail.com (Postfix) with ESMTP id 2538740003 for ; Sun, 14 Jul 2024 05:03:07 +0000 (UTC) Authentication-Results: imf27.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=KzZ+rF7Z; spf=pass (imf27.hostedemail.com: domain of lkp@intel.com designates 198.175.65.9 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1720933354; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=fzfjeiris1FgvKZ0yPHbbTvg7E77zCM+UMdkTJp/p9o=; b=rayy7BK1X8RmENxOXkHNGdvORjgaMKj+xac4lSfEHtUTZFRqTPWPQzPwE88kqBwsNadcvy IZMmBxqCWGmLTJrRx3VoQkO5EHVGV5+ZmtjB0KwM0I7gldJSzWvYZeiWWeEePA4Lx6Qii1 veA07kQtq6yEVFs1kprlt3k1+rbh7cU= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1720933354; a=rsa-sha256; cv=none; b=qHk27Vr79RzoY7NjYryO44BvKDBCNd+G13cHoO/WapzNfMNvS5aYK5psw3NlC0uaSLbB5J VzdGv38jUY/MS8Y9WGQcfP/Ur2/7jeV8hg88TDHna7e7sFO0Dqu+KO1As2mYuC2hKt7mx5 9hqM8+K7BsSwCy16LpfCPgCIFmUHUs8= ARC-Authentication-Results: i=1; imf27.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=KzZ+rF7Z; spf=pass (imf27.hostedemail.com: domain of lkp@intel.com designates 198.175.65.9 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1720933388; x=1752469388; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=zvOpsenYBjMtA4pDUl+tBs6xd1tjtJ6pfBsU3eGJ1J8=; b=KzZ+rF7ZEFes/cyOWQrb7YwcDtH/7eTSU4lHCdtZKAScA3NPJhgtYDaB CsiPUZtjldtwWuRyR1aECCBYfxUW0FRS+/tu4BAe+q+ImdbLXWuZ1ps12 CLRhXBc1SV0QREpTyv4LmeO941fSFvCjv7sD78eTveTdN7NwB/R6qd6Ww GmjylmvRpvm288hjiQwL7lNKQbx6sfHDX7pINWI537cH33ttQFTFnb3nA Q7yas9jiFqJiGoeOui4j10kcaOGY95rDW9GZidN8u+UpiGH+FCSY7eE3Z 9V4f6qY1c7xu+6IF1GnPmoSDIYZGQL747uC7mxkWkZ3huPthhCTITIzRj w==; X-CSE-ConnectionGUID: m74qCV1sSLmo6AuxWupx+w== X-CSE-MsgGUID: H9wIzLvxT2KzTnkGWJNiMw== X-IronPort-AV: E=McAfee;i="6700,10204,11132"; a="40865087" X-IronPort-AV: E=Sophos;i="6.09,207,1716274800"; d="scan'208";a="40865087" Received: from fmviesa007.fm.intel.com ([10.60.135.147]) by orvoesa101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Jul 2024 22:03:06 -0700 X-CSE-ConnectionGUID: cxc+VvOASKuLm5jTYUZhHQ== X-CSE-MsgGUID: 2ZaHAEUbQNObDaDrc6UbAw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.09,207,1716274800"; d="scan'208";a="49163409" Received: from lkp-server01.sh.intel.com (HELO 68891e0c336b) ([10.239.97.150]) by fmviesa007.fm.intel.com with ESMTP; 13 Jul 2024 22:02:59 -0700 Received: from kbuild by 68891e0c336b with local (Exim 4.96) (envelope-from ) id 1sSrNx-000d4z-0d; Sun, 14 Jul 2024 05:02:57 +0000 Date: Sun, 14 Jul 2024 13:02:32 +0800 From: kernel test robot To: Brendan Jackman , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , Andy Lutomirski , Peter Zijlstra , Sean Christopherson , Paolo Bonzini , Alexandre Chartre , Liran Alon , Jan Setje-Eilers , Catalin Marinas , Will Deacon , Mark Rutland , Andrew Morton , Mel Gorman , Lorenzo Stoakes , David Hildenbrand , Vlastimil Babka , Michal Hocko , Khalid Aziz , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Valentin Schneider , Paul Turner , Reiji Watanabe Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, Linux Memory Management List Subject: Re: [PATCH 26/26] KVM: x86: asi: Add some mitigations on address space transitions Message-ID: <202407141222.Av9rdSaZ-lkp@intel.com> References: <20240712-asi-rfc-24-v1-26-144b319a40d8@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20240712-asi-rfc-24-v1-26-144b319a40d8@google.com> X-Rspamd-Queue-Id: 2538740003 X-Stat-Signature: wc7cs63t7qw6cd4y6tcgthpnrnb8utrp X-Rspamd-Server: rspam09 X-Rspam-User: X-HE-Tag: 1720933387-643121 X-HE-Meta: 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 wUrzshvi 7WkQCDdrVTySSQMMo0SgBPWjsYRitzb1qYdD1W5Rge509HyS3voShnu5I69+JTdJtwAoTG4i8fitbsYaCO4r3vmTdQCztq1B31Pa2kt+VCoAlEyOEcohJgcYfHf7/z2KHhS2GZB5DnI+fGZ7urM1BL3fWLg8t7ZxjqIEYN6L+LdN5CD4PgI0bfqtJtWtcNfsZ4qRXxaKMKpQsqMsXKJ3REIy0SKUSDIICImY/1pmmMyTJYjoBT2HZ6x2PFRbiUpVfpQUPgtTbixUyo/vsbmNE2B0dPRoryF8MLs5WGgZZ2nj/Dnmr0Xl07hF7CDwpGD45tHMURlnZomIwq1CoU95HYpHN0u+qh+8bfNs6PPM6YwIdvDw= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi Brendan, kernel test robot noticed the following build errors: [auto build test ERROR on a38297e3fb012ddfa7ce0321a7e5a8daeb1872b6] url: https://github.com/intel-lab-lkp/linux/commits/Brendan-Jackman/mm-asi-Make-some-utility-functions-noinstr-compatible/20240713-012107 base: a38297e3fb012ddfa7ce0321a7e5a8daeb1872b6 patch link: https://lore.kernel.org/r/20240712-asi-rfc-24-v1-26-144b319a40d8%40google.com patch subject: [PATCH 26/26] KVM: x86: asi: Add some mitigations on address space transitions config: i386-buildonly-randconfig-004-20240714 (https://download.01.org/0day-ci/archive/20240714/202407141222.Av9rdSaZ-lkp@intel.com/config) compiler: clang version 18.1.5 (https://github.com/llvm/llvm-project 617a15a9eac96088ae5e9134248d8236e34b91b1) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240714/202407141222.Av9rdSaZ-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202407141222.Av9rdSaZ-lkp@intel.com/ All errors (new ones prefixed by >>): >> arch/x86/kvm/x86.c:9786:12: error: no member named 'post_asi_enter' in 'struct asi_hooks' 9786 | asi_hooks.post_asi_enter = ops->post_asi_enter; | ~~~~~~~~~ ^ 1 error generated. vim +9786 arch/x86/kvm/x86.c 9726 9727 9728 int kvm_x86_vendor_init(struct kvm_x86_init_ops *ops) 9729 { 9730 u64 host_pat; 9731 int r, cpu; 9732 9733 guard(mutex)(&vendor_module_lock); 9734 9735 if (kvm_x86_ops.hardware_enable) { 9736 pr_err("already loaded vendor module '%s'\n", kvm_x86_ops.name); 9737 return -EEXIST; 9738 } 9739 9740 /* 9741 * KVM explicitly assumes that the guest has an FPU and 9742 * FXSAVE/FXRSTOR. For example, the KVM_GET_FPU explicitly casts the 9743 * vCPU's FPU state as a fxregs_state struct. 9744 */ 9745 if (!boot_cpu_has(X86_FEATURE_FPU) || !boot_cpu_has(X86_FEATURE_FXSR)) { 9746 pr_err("inadequate fpu\n"); 9747 return -EOPNOTSUPP; 9748 } 9749 9750 if (IS_ENABLED(CONFIG_PREEMPT_RT) && !boot_cpu_has(X86_FEATURE_CONSTANT_TSC)) { 9751 pr_err("RT requires X86_FEATURE_CONSTANT_TSC\n"); 9752 return -EOPNOTSUPP; 9753 } 9754 9755 /* 9756 * KVM assumes that PAT entry '0' encodes WB memtype and simply zeroes 9757 * the PAT bits in SPTEs. Bail if PAT[0] is programmed to something 9758 * other than WB. Note, EPT doesn't utilize the PAT, but don't bother 9759 * with an exception. PAT[0] is set to WB on RESET and also by the 9760 * kernel, i.e. failure indicates a kernel bug or broken firmware. 9761 */ 9762 if (rdmsrl_safe(MSR_IA32_CR_PAT, &host_pat) || 9763 (host_pat & GENMASK(2, 0)) != 6) { 9764 pr_err("host PAT[0] is not WB\n"); 9765 return -EIO; 9766 } 9767 9768 x86_emulator_cache = kvm_alloc_emulator_cache(); 9769 if (!x86_emulator_cache) { 9770 pr_err("failed to allocate cache for x86 emulator\n"); 9771 return -ENOMEM; 9772 } 9773 9774 user_return_msrs = alloc_percpu(struct kvm_user_return_msrs); 9775 if (!user_return_msrs) { 9776 pr_err("failed to allocate percpu kvm_user_return_msrs\n"); 9777 r = -ENOMEM; 9778 goto out_free_x86_emulator_cache; 9779 } 9780 kvm_nr_uret_msrs = 0; 9781 9782 r = kvm_mmu_vendor_module_init(); 9783 if (r) 9784 goto out_free_percpu; 9785 > 9786 asi_hooks.post_asi_enter = ops->post_asi_enter; 9787 r = asi_register_class("KVM", &asi_hooks); 9788 if (r < 0) 9789 goto out_mmu_exit; 9790 kvm_asi_index = r; 9791 9792 if (boot_cpu_has(X86_FEATURE_XSAVE)) { 9793 host_xcr0 = xgetbv(XCR_XFEATURE_ENABLED_MASK); 9794 kvm_caps.supported_xcr0 = host_xcr0 & KVM_SUPPORTED_XCR0; 9795 } 9796 9797 rdmsrl_safe(MSR_EFER, &host_efer); 9798 9799 if (boot_cpu_has(X86_FEATURE_XSAVES)) 9800 rdmsrl(MSR_IA32_XSS, host_xss); 9801 9802 kvm_init_pmu_capability(ops->pmu_ops); 9803 9804 if (boot_cpu_has(X86_FEATURE_ARCH_CAPABILITIES)) 9805 rdmsrl(MSR_IA32_ARCH_CAPABILITIES, host_arch_capabilities); 9806 9807 r = ops->hardware_setup(); 9808 if (r != 0) 9809 goto out_asi_unregister; 9810 9811 kvm_ops_update(ops); 9812 9813 for_each_online_cpu(cpu) { 9814 smp_call_function_single(cpu, kvm_x86_check_cpu_compat, &r, 1); 9815 if (r < 0) 9816 goto out_unwind_ops; 9817 } 9818 9819 /* 9820 * Point of no return! DO NOT add error paths below this point unless 9821 * absolutely necessary, as most operations from this point forward 9822 * require unwinding. 9823 */ 9824 kvm_timer_init(); 9825 9826 if (pi_inject_timer == -1) 9827 pi_inject_timer = housekeeping_enabled(HK_TYPE_TIMER); 9828 #ifdef CONFIG_X86_64 9829 pvclock_gtod_register_notifier(&pvclock_gtod_notifier); 9830 9831 if (hypervisor_is_type(X86_HYPER_MS_HYPERV)) 9832 set_hv_tscchange_cb(kvm_hyperv_tsc_notifier); 9833 #endif 9834 9835 kvm_register_perf_callbacks(ops->handle_intel_pt_intr); 9836 9837 if (!kvm_cpu_cap_has(X86_FEATURE_XSAVES)) 9838 kvm_caps.supported_xss = 0; 9839 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki