Received: by 2002:a05:7412:b130:b0:e2:908c:2ebd with SMTP id az48csp2531928rdb; Mon, 20 Nov 2023 13:38:35 -0800 (PST) X-Google-Smtp-Source: AGHT+IGIif8M5mt+fCeYV3gsF/tZLcHUphBWurGgRmAMzbHJgy7E2afNpsDa8+HtAD0n5FITtrT3 X-Received: by 2002:a05:6a20:e123:b0:187:bb9c:569 with SMTP id kr35-20020a056a20e12300b00187bb9c0569mr1244683pzb.5.1700516314754; Mon, 20 Nov 2023 13:38:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700516314; cv=none; d=google.com; s=arc-20160816; b=yKEq+zD+pYTEPLYQVeBIj2DQ23UGJ0rQpKwNBYYpBcWgYrZjvGwHcOrnw/xqpFzlnf 00sjElR7njsSlVkupz7NynVg7iENdKSIcYykfmfFwiZV7NRF5xDwypOmF0QJg5CcKX36 Tulg3vOGzwfxtGx/klgpxMzTa9ouhN7xeLJePiLgBHPrz1iZtdN4EDEAX7HBAzNEYful kbbjEhBnqj/1Ui/3II2s7sRXymX6bSVPzC8uJWbjggoQ3zCtnbmZzQjgwz2r0ek3gTER SRjWNdj/ji2Wyy+RwW4HR5nXKHn+y1y28u+g2hR3frmbpOQgHrcGF47SZV3v16VKAO9c Wj1Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=ZlHbZEymjnJArAtz+oslROFDQDGdcom94mpyzmffd0Q=; fh=Tjp1DfCJp4GPw1F8MQ1zKinXee3IoBvuy4XT4rjzMZY=; b=VgezFQU0zwt3Ac2UGAQfGoRhlbcqX+1EBIsDwlW3L2zYi16BnaQU501pLQ17+kMfNX CEjV/H3gs1SewTM85b4TpUWzBb38Pxu8BYC8esk18F2arxoWBF+yeqcVQw/iHczstPFV 2pJp5E1jIMZNamL8kkJPDyeThmaCbHrkW7/5lvDKc9sFw3IB1qD3j46zndTcQcp3e6w+ KSkTdzyrkV2bE7TyTmi6W0PH5jEx3l+PXRhUi90RqnI/bzN2+ZGdSv5ze3qqeknjZ9te 3TuSBfz8bB63lLZ5wTkEm9+odx/e4XTb+Oj+bIkySJHOUPF/QATIK04qJdAj/Yfa3imX dwGw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=RS93XSkX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id x28-20020aa78f1c000000b006be08015248si8698065pfr.294.2023.11.20.13.38.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 20 Nov 2023 13:38:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=RS93XSkX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 539D8809FC83; Mon, 20 Nov 2023 13:38:31 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232003AbjKTVib (ORCPT + 99 others); Mon, 20 Nov 2023 16:38:31 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58268 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229529AbjKTVia (ORCPT ); Mon, 20 Nov 2023 16:38:30 -0500 Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.151]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8E736CA; Mon, 20 Nov 2023 13:38:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1700516306; x=1732052306; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=o3m56hl+JqpBTbDARZLvzqTO79AW8kpf8jC8GzCYZig=; b=RS93XSkXyuwIyOF/zDrhESMWJysdcRIIN4WI227fOSZMlJpD0F8DyGQS WX6dppZdSAHPmarIO0KvjgdKPtVZnirJFEcR61/5NjnC59RXuzpQB8Ys9 np/l5BXEa48ZOFcpIrbe6KGrfcoEdPAAnN6zjptWwcA0aOKBpXHjaBMH/ /oxyGQ8wOGNaZw1Tk73CJUzyxkti10yRGOArsxIIRbhLWAeoeN86BXowv 1KfnN7QR9yi2P8TeQrFSGLg/x04fSg31zsp5K2IXjkvymgWB2DXmkm/lm ErfWB912pvBNH9xN44a/qAUsgAVrI2gmZYU4P+DU87kKJ5P4bxlUiiqfP Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10900"; a="371886532" X-IronPort-AV: E=Sophos;i="6.04,214,1695711600"; d="scan'208";a="371886532" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Nov 2023 13:38:19 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10900"; a="890056312" X-IronPort-AV: E=Sophos;i="6.04,214,1695711600"; d="scan'208";a="890056312" Received: from lkp-server02.sh.intel.com (HELO b8de5498638e) ([10.239.97.151]) by orsmga004.jf.intel.com with ESMTP; 20 Nov 2023 13:38:11 -0800 Received: from kbuild by b8de5498638e with local (Exim 4.96) (envelope-from ) id 1r5By4-0006wq-2K; Mon, 20 Nov 2023 21:38:08 +0000 Date: Tue, 21 Nov 2023 05:38:03 +0800 From: kernel test robot To: Valentin Schneider , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, linux-arch@vger.kernel.org, x86@kernel.org Cc: oe-kbuild-all@lists.linux.dev, Peter Zijlstra , Thomas Gleixner , Borislav Petkov , Josh Poimboeuf , Pawan Gupta , Ingo Molnar , Dave Hansen , "H. Peter Anvin" , Paolo Bonzini , Wanpeng Li , Vitaly Kuznetsov , Arnd Bergmann , Jason Baron , Steven Rostedt , Ard Biesheuvel , Frederic Weisbecker , "Paul E. McKenney" , Feng Tang , Andrew Morton , Linux Memory Management List , "Mike Rapoport (IBM)" , Vlastimil Babka , David Hildenbrand , "ndesaulniers@google.com" , Michael Kelley , "Masami Hiramatsu (Google)" Subject: Re: [PATCH 1/5] jump_label,module: Don't alloc static_key_mod for __ro_after_init keys Message-ID: <202311210541.RAdnu4yL-lkp@intel.com> References: <20231120105528.760306-2-vschneid@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231120105528.760306-2-vschneid@redhat.com> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Mon, 20 Nov 2023 13:38:31 -0800 (PST) Hi Valentin, kernel test robot noticed the following build errors: [auto build test ERROR on tip/x86/core] [also build test ERROR on linus/master v6.7-rc2 next-20231120] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Valentin-Schneider/jump_label-module-Don-t-alloc-static_key_mod-for-__ro_after_init-keys/20231120-190044 base: tip/x86/core patch link: https://lore.kernel.org/r/20231120105528.760306-2-vschneid%40redhat.com patch subject: [PATCH 1/5] jump_label,module: Don't alloc static_key_mod for __ro_after_init keys config: s390-allnoconfig (https://download.01.org/0day-ci/archive/20231121/202311210541.RAdnu4yL-lkp@intel.com/config) compiler: s390-linux-gcc (GCC) 13.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231121/202311210541.RAdnu4yL-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202311210541.RAdnu4yL-lkp@intel.com/ All errors (new ones prefixed by >>): init/main.c: In function 'mark_readonly': >> init/main.c:1406:17: error: implicit declaration of function 'jump_label_ro'; did you mean 'jump_label_lock'? [-Werror=implicit-function-declaration] 1406 | jump_label_ro(); | ^~~~~~~~~~~~~ | jump_label_lock cc1: some warnings being treated as errors vim +1406 init/main.c 1394 1395 #ifdef CONFIG_STRICT_KERNEL_RWX 1396 static void mark_readonly(void) 1397 { 1398 if (rodata_enabled) { 1399 /* 1400 * load_module() results in W+X mappings, which are cleaned 1401 * up with call_rcu(). Let's make sure that queued work is 1402 * flushed so that we don't hit false positives looking for 1403 * insecure pages which are W+X. 1404 */ 1405 rcu_barrier(); > 1406 jump_label_ro(); 1407 mark_rodata_ro(); 1408 rodata_test(); 1409 } else 1410 pr_info("Kernel memory protection disabled.\n"); 1411 } 1412 #elif defined(CONFIG_ARCH_HAS_STRICT_KERNEL_RWX) 1413 static inline void mark_readonly(void) 1414 { 1415 pr_warn("Kernel memory protection not selected by kernel config.\n"); 1416 } 1417 #else 1418 static inline void mark_readonly(void) 1419 { 1420 pr_warn("This architecture does not have kernel memory protection.\n"); 1421 } 1422 #endif 1423 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki