Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4724739pxj; Wed, 12 May 2021 11:46:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzAnep++AgB4C62sx3OmJabOoT5Q/M85gKomkpFhjmyBEM4oJFmXK0vldefEvKglkWbOMm5 X-Received: by 2002:a17:906:15c7:: with SMTP id l7mr17603184ejd.167.1620845208620; Wed, 12 May 2021 11:46:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620845208; cv=none; d=google.com; s=arc-20160816; b=YRJNaD3b7GAbP/4Uc3lJCYRITf43eVzfNRTBq/qL8VlRtxv4Zp3wtb6YKodU0ATxg3 Vvp8s3oJU4ryJnod45x9+3NaD99EBAEYX9PF/gYZKIMyg/kNYeAxNHZk9GnWj3247t9n ic3FHm8KVk3jNQDB9BHhjv/tN4yUvfXJqzYYwz6D5725yxJRgImg7P/rhnRS1J+d10VD 6NST0RcHhwT/ptTaUcS7SSqBYThbzD8EnH5TqE4oe6X8fabVeV/beiLg2xa0D8qnC3F6 gV5YItIz2CHi8/DmiY5do9+SSlMFWmOdfXNr5422p7bD986f14h3OeGvzhLjnThurtG/ UGbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=4UBG32YkfsRwTbkaS+dsN6lq+erhJK3khDPvq82cR54=; b=hdcAmHHE9scRbNStVk98RWdb4gSt93mSZs0X275KNnvUPBdbVQXs1fN6NX/TQrVLGX E73+2Cihd7I26yy5LeAXuYJCQJjtwuP5pOsrfQFXfG6LoQBU+gkf6BJr064g0ZtoT8lp JLG6fPRBr9c3L0ya3pKK2hvmgOFd5Zs2Ry83sIXTFNCbYLZ+SN0mU/+5syXBIf1GaP4L NY0fF90dr9r1snIXIrrFUk8Dt66DAgyOJRIbK+ml2UHtuiaU+RiVGyTG54/MNIgACt2V HHqzGfxsU30C4JTAJtFJfi2PzlZXwiKroZYsloC1c7yG9xuPlyrHUdmkMQCLDNHODczG gC/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=zEBZVCPK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t12si594216edc.33.2021.05.12.11.46.24; Wed, 12 May 2021 11:46:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=zEBZVCPK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1357694AbhELSjH (ORCPT + 99 others); Wed, 12 May 2021 14:39:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:57038 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239333AbhELQjN (ORCPT ); Wed, 12 May 2021 12:39:13 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 30D3F61CDC; Wed, 12 May 2021 16:03:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1620835400; bh=dSlLP63PWlZHN1GeBudK1cX8cwBEx13LutiAukkurSo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=zEBZVCPKEZONtMuyMg7tqIAyOb5MlBmQzA0Mo/KSPQzktnWYVAm0JlaQ1wxWEVreR ocJderL7tN2CJ2Ftb+11qJiEWPQ7sUSroFjnDtky5xs0lXYJA3kIf7ljj/t03bxqTD earbc/3Pf8uNjDMBErzFL+78EO0PXlNy+eCAKSWE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ingo Molnar , Mike Travis , Sasha Levin Subject: [PATCH 5.12 328/677] x86/platform/uv: Fix !KEXEC build failure Date: Wed, 12 May 2021 16:46:14 +0200 Message-Id: <20210512144848.149699329@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210512144837.204217980@linuxfoundation.org> References: <20210512144837.204217980@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ingo Molnar [ Upstream commit c2209ea55612efac75de0a58ef5f7394fae7fa0f ] When KEXEC is disabled, the UV build fails: arch/x86/platform/uv/uv_nmi.c:875:14: error: ‘uv_nmi_kexec_failed’ undeclared (first use in this function) Since uv_nmi_kexec_failed is only defined in the KEXEC_CORE #ifdef branch, this code cannot ever have been build tested: if (main) pr_err("UV: NMI kdump: KEXEC not supported in this kernel\n"); atomic_set(&uv_nmi_kexec_failed, 1); Nor is this use possible in uv_handle_nmi(): atomic_set(&uv_nmi_kexec_failed, 0); These bugs were introduced in this commit: d0a9964e9873: ("x86/platform/uv: Implement simple dump failover if kdump fails") Which added the uv_nmi_kexec_failed assignments to !KEXEC code, while making the definition KEXEC-only - apparently without testing the !KEXEC case. Instead of complicating the #ifdef maze, simplify the code by requiring X86_UV to depend on KEXEC_CORE. This pattern is present in other architectures as well. ( We'll remove the untested, 7 years old !KEXEC complications from the file in a separate commit. ) Fixes: d0a9964e9873: ("x86/platform/uv: Implement simple dump failover if kdump fails") Signed-off-by: Ingo Molnar Cc: Mike Travis Cc: linux-kernel@vger.kernel.org Signed-off-by: Sasha Levin --- arch/x86/Kconfig | 1 + 1 file changed, 1 insertion(+) diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index 268b7d5c9835..861b1b794697 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -571,6 +571,7 @@ config X86_UV depends on X86_EXTENDED_PLATFORM depends on NUMA depends on EFI + depends on KEXEC_CORE depends on X86_X2APIC depends on PCI help -- 2.30.2