From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.31]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B4AD428F5; Sat, 12 Aug 2023 14:36:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1691850983; x=1723386983; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=R7NRsqEtZsZwqqRfMkes7tldaRARTKA/e6Mek0FrHvo=; b=YFFeA7ErsSJZiczXA7XUAwVfaX9FwGBP6cBape4MtZyPjoxFfctT+lmQ sRSUPG0yuX3n5+AFT4lhy2ZGrS43TyjfqxmjeoovD17N+iWPI/B4oO6HT CWMnuusd+eXFTrp1/AtxVaLmjiq77W2d0eQrYZOrwXziWudQNHHDGI4M2 TbMc3g/xrV8fnPNaGsihn2K9HCw9+OxN6Zugb3H+r5Y3/kbxvg6GIJqOJ ic/n+ceeIoLJpYyyzyTgx7OQo0jFWnZTuniq/18t78k0Gwnwfeje//PIN JXrwTLCwB7s30u/RL9NieNH3Ai3JIm47kjgDJmwvqO01NXQ4iNZp4kWNe g==; X-IronPort-AV: E=McAfee;i="6600,9927,10800"; a="435724845" X-IronPort-AV: E=Sophos;i="6.01,168,1684825200"; d="scan'208";a="435724845" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Aug 2023 07:36:20 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10800"; a="762473293" X-IronPort-AV: E=Sophos;i="6.01,168,1684825200"; d="scan'208";a="762473293" Received: from lkp-server01.sh.intel.com (HELO d1ccc7e87e8f) ([10.239.97.150]) by orsmga008.jf.intel.com with ESMTP; 12 Aug 2023 07:36:16 -0700 Received: from kbuild by d1ccc7e87e8f with local (Exim 4.96) (envelope-from ) id 1qUpix-0008ca-19; Sat, 12 Aug 2023 14:36:15 +0000 Date: Sat, 12 Aug 2023 22:35:49 +0800 From: kernel test robot To: Sami Tolvanen , Paul Walmsley , Palmer Dabbelt , Albert Ou , Kees Cook Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, Guo Ren , Deepak Gupta , Nathan Chancellor , Nick Desaulniers , Fangrui Song , linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, Jisheng Zhang Subject: Re: [PATCH 1/5] riscv: VMAP_STACK overflow detection thread-safe Message-ID: <202308122238.XLMMmeL0-lkp@intel.com> References: <20230811233556.97161-8-samitolvanen@google.com> Precedence: bulk X-Mailing-List: llvm@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230811233556.97161-8-samitolvanen@google.com> Hi Sami, kernel test robot noticed the following build errors: [auto build test ERROR on 52a93d39b17dc7eb98b6aa3edb93943248e03b2f] url: https://github.com/intel-lab-lkp/linux/commits/Sami-Tolvanen/riscv-VMAP_STACK-overflow-detection-thread-safe/20230812-073751 base: 52a93d39b17dc7eb98b6aa3edb93943248e03b2f patch link: https://lore.kernel.org/r/20230811233556.97161-8-samitolvanen%40google.com patch subject: [PATCH 1/5] riscv: VMAP_STACK overflow detection thread-safe config: riscv-randconfig-r042-20230812 (https://download.01.org/0day-ci/archive/20230812/202308122238.XLMMmeL0-lkp@intel.com/config) compiler: clang version 17.0.0 (https://github.com/llvm/llvm-project.git 4a5ac14ee968ff0ad5d2cc1ffa0299048db4c88a) reproduce: (https://download.01.org/0day-ci/archive/20230812/202308122238.XLMMmeL0-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202308122238.XLMMmeL0-lkp@intel.com/ All errors (new ones prefixed by >>): >> ld.lld: error: undefined symbol: __per_cpu_offset >>> referenced by arch/riscv/kernel/entry.o:(handle_kernel_stack_overflow) in archive vmlinux.a -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki