Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp513755rdb; Tue, 5 Dec 2023 11:25:41 -0800 (PST) X-Google-Smtp-Source: AGHT+IHwpVOZpzSmVHTFVsjiPnOAqqJjQ/PUmoHGNFoxJLLGyDDivdSB6s/VedaUEMPTorZnUm+t X-Received: by 2002:a17:90a:1601:b0:286:d464:687e with SMTP id n1-20020a17090a160100b00286d464687emr1496212pja.18.1701804340694; Tue, 05 Dec 2023 11:25:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701804340; cv=none; d=google.com; s=arc-20160816; b=cyUbunb/FF533EnChjQTjPS37aMmyRXrvxMcB4rO5ixUjte3q2C29ROWBlWdaN+N9S LTcKBnNXxZB1pORSA6HwZ8PxCnNURUAlEFnxGKYtrDkFWk8T1Dk4qmICvUOzUU3MUtfv kyp93WjiJ6JVcKLuP0So75x76J8te6FF46PlJwyA4AOivofFdvdsLtDPg2ljlTsJ7JNl 0uwoeDivokZ9787menLvYayr12pTGQD5kIQUQSnZg6flasHWfeDDBKwhnY5HhirhdiUD IloBrw71K+iPwDX9VVNXR4d5rnODR23e+6LExIF1UXmWSZNaouCkFPedBfaGDy/7PAkl d1iA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=KIn6SGFCA5M/pC1cumqW0P9ck4YNczoBeEhK7qZZ43g=; fh=bU/B1EuNHjq60U46x7YNBvBPwG69dLbSH/EZhJlxJyM=; b=zAzbrsdUoDtOQWNZKAbtrom6dBvfjg06wiN7AsT0yGiDoXtCsLD/JewoZ00hCLVw9k 0Nr6sU4quVLmeol2JtSI6OLYVk6dLXBTuw424NBTpYoM6SLa96rFfPrqv9woc+P/ZOtj w6rAmcKIaXJA4siCo+EGVvW4xUB4CJlJ/tlUjAlNMGaJGuA/AuklQ3Tx2dp6GaThDimK 07KxICNlVMRZTS62jbxkQDMrtfFk170f63icyUP6Tc0qFONUPv5rG7yWFAY1hBq6rH1I AWqTS6gJMrlo7D1noGEMrA5S1JRJHeEYotteEGpctVUarTNZ8ERM1pdcb0eSUmgmYeX0 ElFg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=JnpV2zqG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id cn6-20020a17090af08600b002859aae3eaasi3668601pjb.66.2023.12.05.11.25.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 05 Dec 2023 11:25:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=JnpV2zqG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 5B32E80944C8; Tue, 5 Dec 2023 11:25:29 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232220AbjLETYw (ORCPT + 99 others); Tue, 5 Dec 2023 14:24:52 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37038 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235019AbjLETYt (ORCPT ); Tue, 5 Dec 2023 14:24:49 -0500 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.7]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0E1AB1AA for ; Tue, 5 Dec 2023 11:24:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1701804295; x=1733340295; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=0QVKjEritWehiYGZr61Yup2IobSGJaXvEWGoW1hOZyU=; b=JnpV2zqGoehhNhsDoa9+7vnOlIMd58kJOPoUv+Lq/1cTeBNXG6oCZB5i EzpoIQdw+Zl3UkdfpizS9d3h+g/86yddb8yR+ZcVgKLu4g0Izw/+lZeTk hc74BhcnUMW0UsWwwPRsV/fKiOXNjbuOprkCMywdpe+TN5i2Q5IUzLDgw lpPtIGfCFMoWiBrSyYnvrb1/PApQI8oMBwvi4sBwHtKj8B3jWFhp2vHS2 Xtf9Ou3I3vjp8wgbmTgrVrmKETMlfpSc3UEcRHqID6Z/znvkthL92VM/3 6SXqbjTwLkzDcfBSuSTwd4n6NLyxWU1NSJIzWub/H4B+dQ9ZY2NgL6StK g==; X-IronPort-AV: E=McAfee;i="6600,9927,10915"; a="15497080" X-IronPort-AV: E=Sophos;i="6.04,253,1695711600"; d="scan'208";a="15497080" Received: from orsmga003.jf.intel.com ([10.7.209.27]) by fmvoesa101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Dec 2023 11:24:48 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10915"; a="720822557" X-IronPort-AV: E=Sophos;i="6.04,253,1695711600"; d="scan'208";a="720822557" Received: from lkp-server02.sh.intel.com (HELO b07ab15da5fe) ([10.239.97.151]) by orsmga003.jf.intel.com with ESMTP; 05 Dec 2023 11:24:45 -0800 Received: from kbuild by b07ab15da5fe with local (Exim 4.96) (envelope-from ) id 1rAb2A-0009bh-2k; Tue, 05 Dec 2023 19:24:42 +0000 Date: Wed, 6 Dec 2023 03:24:26 +0800 From: kernel test robot To: "Kirill A. Shutemov" , Tom Lendacky , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, "H. Peter Anvin" , x86@kernel.org, linux-coco@lists.linux.dev, linux-kernel@vger.kernel.org, "Kirill A. Shutemov" Subject: Re: [PATCH] x86/coco, x86/sev: Use cpu_feature_enabled() to detect SEV guest flavor Message-ID: <202312060344.u4FP0DKh-lkp@intel.com> References: <20231205143738.2875-1-kirill.shutemov@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231205143738.2875-1-kirill.shutemov@linux.intel.com> X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Tue, 05 Dec 2023 11:25:29 -0800 (PST) Hi Kirill, kernel test robot noticed the following build errors: [auto build test ERROR on next-20231205] [also build test ERROR on v6.7-rc4] [cannot apply to tip/x86/core tip/x86/mm kvm/queue linus/master kvm/linux-next v6.7-rc4 v6.7-rc3 v6.7-rc2] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Kirill-A-Shutemov/x86-coco-x86-sev-Use-cpu_feature_enabled-to-detect-SEV-guest-flavor/20231205-223950 base: next-20231205 patch link: https://lore.kernel.org/r/20231205143738.2875-1-kirill.shutemov%40linux.intel.com patch subject: [PATCH] x86/coco, x86/sev: Use cpu_feature_enabled() to detect SEV guest flavor config: i386-randconfig-011-20231205 (https://download.01.org/0day-ci/archive/20231206/202312060344.u4FP0DKh-lkp@intel.com/config) compiler: clang version 16.0.4 (https://github.com/llvm/llvm-project.git ae42196bc493ffe877a7e3dff8be32035dea4d07) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231206/202312060344.u4FP0DKh-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202312060344.u4FP0DKh-lkp@intel.com/ All errors (new ones prefixed by >>): >> arch/x86/realmode/init.c:73:7: error: no member named 'flags' in 'struct trampoline_header' th->flags |= TH_FLAGS_SME_ACTIVE; ~~ ^ >> arch/x86/realmode/init.c:80:21: error: use of undeclared identifier 'secondary_startup_64_no_verify' th->start = (u64) secondary_startup_64_no_verify; ^ 2 errors generated. vim +73 arch/x86/realmode/init.c 4f7b92263ad68c Yinghai Lu 2013-01-24 69 75d359ec4141b0 Michael Roth 2022-04-22 70 static void __init sme_sev_setup_real_mode(struct trampoline_header *th) 8940ac9ced8bc1 Tom Lendacky 2020-09-07 71 { 32cb4d02fb02ca Tom Lendacky 2021-09-08 72 if (cc_platform_has(CC_ATTR_HOST_MEM_ENCRYPT)) 8940ac9ced8bc1 Tom Lendacky 2020-09-07 @73 th->flags |= TH_FLAGS_SME_ACTIVE; 8940ac9ced8bc1 Tom Lendacky 2020-09-07 74 653ce82f92271f Kirill A. Shutemov 2023-12-05 75 if (cpu_feature_enabled(X86_FEATURE_SEV_ES_GUEST)) { 3ecacdbd23956a Joerg Roedel 2020-09-07 76 /* 3ecacdbd23956a Joerg Roedel 2020-09-07 77 * Skip the call to verify_cpu() in secondary_startup_64 as it 3ecacdbd23956a Joerg Roedel 2020-09-07 78 * will cause #VC exceptions when the AP can't handle them yet. 3ecacdbd23956a Joerg Roedel 2020-09-07 79 */ 3ecacdbd23956a Joerg Roedel 2020-09-07 @80 th->start = (u64) secondary_startup_64_no_verify; 3ecacdbd23956a Joerg Roedel 2020-09-07 81 8940ac9ced8bc1 Tom Lendacky 2020-09-07 82 if (sev_es_setup_ap_jump_table(real_mode_header)) 8940ac9ced8bc1 Tom Lendacky 2020-09-07 83 panic("Failed to get/update SEV-ES AP Jump Table"); 8940ac9ced8bc1 Tom Lendacky 2020-09-07 84 } 8940ac9ced8bc1 Tom Lendacky 2020-09-07 85 } 8940ac9ced8bc1 Tom Lendacky 2020-09-07 86 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki