From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0ABE7329365; Thu, 27 Nov 2025 09:25:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.175.65.21 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1764235518; cv=none; b=HwPq6Mjp4DwFKuxoDGAVRvR3VSWCsEliJyEnKh/JFczxjpmYnLQ2u2HmL3bkVqErii+F5AmMzZ3ZdXlb5aKx/T5ZKPyEUg1Y8Lo6siR9vMObJhJn46WmQY+EjE6ZYQKx3FYDZ61acZlReLozJsdiOCeUnhg9zVQdZyEf3YdPq8U= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1764235518; c=relaxed/simple; bh=dKVw7WCI669xYparOitpzs+aXbeQn7xNAtOzxdtNdjc=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=m+9ISvQN4XKF9b9uJ/k4dLFcgPUQfnjVay5uccTuLRbvsoQNLc6DLvhXYv+7PcBCw0X6X3MUISC0+9pcVsq3WuK9oGbSxVok52PgLuBmpIMauOsvhXIAiQ1ZxosOndd9xpwml1gNTQESc68PpmLnVbaZ/Hp8ub7zZCepz//3yE4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=fXKn5kNb; arc=none smtp.client-ip=198.175.65.21 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="fXKn5kNb" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1764235517; x=1795771517; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=dKVw7WCI669xYparOitpzs+aXbeQn7xNAtOzxdtNdjc=; b=fXKn5kNb66rpdy2QGxPQeBEidro4nmC0DqIyBl+TeNTJn/wsvND9fwWZ E9k/IqyHcdhRiKie7UtRFzPOF5JzTSP2C6GAXD67dI61vNZIYoJDfztqE VciTDg24eULxtGYItNIwFYpGcVCiCB62smso+6V98ofG3F6+bvOhOQd8X AC0pvWIyJPwkv2z5A2h3Y/y8vUeCee6Z3yM7sX4PBZUaThwZQMr3FhPOG oAXdYGKZsleeBqR/S8drlz3AdpsGNqM4hP3dQw6VOc5VUfTSGVy057SB5 SiZ/XS1WXhGMt8nGvHkY45e0stWOOgo0UfUQR+X3X6+AxvGaJflueUGMa w==; X-CSE-ConnectionGUID: /2wbn06nQsCWB1a12Vcs3Q== X-CSE-MsgGUID: THDeDzXBQ6KTDyq5wrcZzg== X-IronPort-AV: E=McAfee;i="6800,10657,11625"; a="66226424" X-IronPort-AV: E=Sophos;i="6.20,230,1758610800"; d="scan'208";a="66226424" Received: from orviesa009.jf.intel.com ([10.64.159.149]) by orvoesa113.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Nov 2025 01:25:17 -0800 X-CSE-ConnectionGUID: qnUhwLQBRx2i3D9EMh7ltA== X-CSE-MsgGUID: wTQgJDKGRmC9eSaGlBaXGQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.20,230,1758610800"; d="scan'208";a="193000719" Received: from lkp-server01.sh.intel.com (HELO 4664bbef4914) ([10.239.97.150]) by orviesa009.jf.intel.com with ESMTP; 27 Nov 2025 01:25:10 -0800 Received: from kbuild by 4664bbef4914 with local (Exim 4.98.2) (envelope-from ) id 1vOYFP-000000004CQ-2yB2; Thu, 27 Nov 2025 09:25:07 +0000 Date: Thu, 27 Nov 2025 17:24:20 +0800 From: kernel test robot To: Juergen Gross , linux-kernel@vger.kernel.org, x86@kernel.org, linux-hyperv@vger.kernel.org, virtualization@lists.linux.dev, kvm@vger.kernel.org Cc: oe-kbuild-all@lists.linux.dev, Juergen Gross , "K. Y. Srinivasan" , Haiyang Zhang , Wei Liu , Dexuan Cui , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , Ajay Kaher , Alexey Makhalov , Broadcom internal kernel review list , Paolo Bonzini , Vitaly Kuznetsov , Boris Ostrovsky , Josh Poimboeuf , Peter Zijlstra , xen-devel@lists.xenproject.org Subject: Re: [PATCH v4 21/21] x86/pvlocks: Move paravirt spinlock functions into own header Message-ID: <202511271704.MdDOB4pB-lkp@intel.com> References: <20251127070844.21919-22-jgross@suse.com> Precedence: bulk X-Mailing-List: virtualization@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20251127070844.21919-22-jgross@suse.com> Hi Juergen, kernel test robot noticed the following build errors: [auto build test ERROR on tip/x86/core] [also build test ERROR on tip/sched/core kvm/queue kvm/next linus/master v6.18-rc7] [cannot apply to kvm/linux-next next-20251127] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Juergen-Gross/x86-paravirt-Remove-not-needed-includes-of-paravirt-h/20251127-152054 base: tip/x86/core patch link: https://lore.kernel.org/r/20251127070844.21919-22-jgross%40suse.com patch subject: [PATCH v4 21/21] x86/pvlocks: Move paravirt spinlock functions into own header config: i386-allnoconfig (https://download.01.org/0day-ci/archive/20251127/202511271704.MdDOB4pB-lkp@intel.com/config) compiler: gcc-14 (Debian 14.2.0-19) 14.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20251127/202511271704.MdDOB4pB-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202511271704.MdDOB4pB-lkp@intel.com/ All errors (new ones prefixed by >>): arch/x86/kernel/alternative.c: In function 'alternative_instructions': >> arch/x86/kernel/alternative.c:2373:9: error: implicit declaration of function 'paravirt_set_cap'; did you mean 'paravirt_ret0'? [-Wimplicit-function-declaration] 2373 | paravirt_set_cap(); | ^~~~~~~~~~~~~~~~ | paravirt_ret0 vim +2373 arch/x86/kernel/alternative.c 270a69c4485d7d0 arch/x86/kernel/alternative.c Peter Zijlstra 2023-02-08 2344 9a0b5817ad97bb7 arch/i386/kernel/alternative.c Gerd Hoffmann 2006-03-23 2345 void __init alternative_instructions(void) 9a0b5817ad97bb7 arch/i386/kernel/alternative.c Gerd Hoffmann 2006-03-23 2346 { ebebe30794d38c5 arch/x86/kernel/alternative.c Pawan Gupta 2025-05-03 2347 u64 ibt; ebebe30794d38c5 arch/x86/kernel/alternative.c Pawan Gupta 2025-05-03 2348 7457c0da024b181 arch/x86/kernel/alternative.c Peter Zijlstra 2019-05-03 2349 int3_selftest(); 7457c0da024b181 arch/x86/kernel/alternative.c Peter Zijlstra 2019-05-03 2350 7457c0da024b181 arch/x86/kernel/alternative.c Peter Zijlstra 2019-05-03 2351 /* 7457c0da024b181 arch/x86/kernel/alternative.c Peter Zijlstra 2019-05-03 2352 * The patching is not fully atomic, so try to avoid local 7457c0da024b181 arch/x86/kernel/alternative.c Peter Zijlstra 2019-05-03 2353 * interruptions that might execute the to be patched code. 7457c0da024b181 arch/x86/kernel/alternative.c Peter Zijlstra 2019-05-03 2354 * Other CPUs are not running. 7457c0da024b181 arch/x86/kernel/alternative.c Peter Zijlstra 2019-05-03 2355 */ 8f4e956b313dccc arch/i386/kernel/alternative.c Andi Kleen 2007-07-22 2356 stop_nmi(); 123aa76ec0cab5d arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2357 123aa76ec0cab5d arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2358 /* 123aa76ec0cab5d arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2359 * Don't stop machine check exceptions while patching. 123aa76ec0cab5d arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2360 * MCEs only happen when something got corrupted and in this 123aa76ec0cab5d arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2361 * case we must do something about the corruption. 32b1cbe380417f2 arch/x86/kernel/alternative.c Marco Ammon 2019-09-02 2362 * Ignoring it is worse than an unlikely patching race. 123aa76ec0cab5d arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2363 * Also machine checks tend to be broadcast and if one CPU 123aa76ec0cab5d arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2364 * goes into machine check the others follow quickly, so we don't 123aa76ec0cab5d arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2365 * expect a machine check to cause undue problems during to code 123aa76ec0cab5d arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2366 * patching. 123aa76ec0cab5d arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2367 */ 8f4e956b313dccc arch/i386/kernel/alternative.c Andi Kleen 2007-07-22 2368 4e6292114c74122 arch/x86/kernel/alternative.c Juergen Gross 2021-03-11 2369 /* f7af6977621a416 arch/x86/kernel/alternative.c Juergen Gross 2023-12-10 2370 * Make sure to set (artificial) features depending on used paravirt f7af6977621a416 arch/x86/kernel/alternative.c Juergen Gross 2023-12-10 2371 * functions which can later influence alternative patching. 4e6292114c74122 arch/x86/kernel/alternative.c Juergen Gross 2021-03-11 2372 */ 4e6292114c74122 arch/x86/kernel/alternative.c Juergen Gross 2021-03-11 @2373 paravirt_set_cap(); 4e6292114c74122 arch/x86/kernel/alternative.c Juergen Gross 2021-03-11 2374 ebebe30794d38c5 arch/x86/kernel/alternative.c Pawan Gupta 2025-05-03 2375 /* Keep CET-IBT disabled until caller/callee are patched */ ebebe30794d38c5 arch/x86/kernel/alternative.c Pawan Gupta 2025-05-03 2376 ibt = ibt_save(/*disable*/ true); ebebe30794d38c5 arch/x86/kernel/alternative.c Pawan Gupta 2025-05-03 2377 931ab63664f02b1 arch/x86/kernel/alternative.c Peter Zijlstra 2022-10-27 2378 __apply_fineibt(__retpoline_sites, __retpoline_sites_end, 1d7e707af446134 arch/x86/kernel/alternative.c Mike Rapoport (Microsoft 2025-01-26 2379) __cfi_sites, __cfi_sites_end, true); 026211c40b05548 arch/x86/kernel/alternative.c Kees Cook 2025-09-03 2380 cfi_debug = false; 931ab63664f02b1 arch/x86/kernel/alternative.c Peter Zijlstra 2022-10-27 2381 7508500900814d1 arch/x86/kernel/alternative.c Peter Zijlstra 2021-10-26 2382 /* 7508500900814d1 arch/x86/kernel/alternative.c Peter Zijlstra 2021-10-26 2383 * Rewrite the retpolines, must be done before alternatives since 7508500900814d1 arch/x86/kernel/alternative.c Peter Zijlstra 2021-10-26 2384 * those can rewrite the retpoline thunks. 7508500900814d1 arch/x86/kernel/alternative.c Peter Zijlstra 2021-10-26 2385 */ 1d7e707af446134 arch/x86/kernel/alternative.c Mike Rapoport (Microsoft 2025-01-26 2386) apply_retpolines(__retpoline_sites, __retpoline_sites_end); 1d7e707af446134 arch/x86/kernel/alternative.c Mike Rapoport (Microsoft 2025-01-26 2387) apply_returns(__return_sites, __return_sites_end); 7508500900814d1 arch/x86/kernel/alternative.c Peter Zijlstra 2021-10-26 2388 a82b26451de126a arch/x86/kernel/alternative.c Peter Zijlstra (Intel 2025-06-03 2389) its_fini_core(); a82b26451de126a arch/x86/kernel/alternative.c Peter Zijlstra (Intel 2025-06-03 2390) e81dc127ef69887 arch/x86/kernel/alternative.c Thomas Gleixner 2022-09-15 2391 /* ab9fea59487d8b5 arch/x86/kernel/alternative.c Peter Zijlstra 2025-02-07 2392 * Adjust all CALL instructions to point to func()-10, including ab9fea59487d8b5 arch/x86/kernel/alternative.c Peter Zijlstra 2025-02-07 2393 * those in .altinstr_replacement. e81dc127ef69887 arch/x86/kernel/alternative.c Thomas Gleixner 2022-09-15 2394 */ e81dc127ef69887 arch/x86/kernel/alternative.c Thomas Gleixner 2022-09-15 2395 callthunks_patch_builtin_calls(); e81dc127ef69887 arch/x86/kernel/alternative.c Thomas Gleixner 2022-09-15 2396 ab9fea59487d8b5 arch/x86/kernel/alternative.c Peter Zijlstra 2025-02-07 2397 apply_alternatives(__alt_instructions, __alt_instructions_end); ab9fea59487d8b5 arch/x86/kernel/alternative.c Peter Zijlstra 2025-02-07 2398 be0fffa5ca894a9 arch/x86/kernel/alternative.c Peter Zijlstra 2023-06-22 2399 /* be0fffa5ca894a9 arch/x86/kernel/alternative.c Peter Zijlstra 2023-06-22 2400 * Seal all functions that do not have their address taken. be0fffa5ca894a9 arch/x86/kernel/alternative.c Peter Zijlstra 2023-06-22 2401 */ 1d7e707af446134 arch/x86/kernel/alternative.c Mike Rapoport (Microsoft 2025-01-26 2402) apply_seal_endbr(__ibt_endbr_seal, __ibt_endbr_seal_end); ed53a0d971926e4 arch/x86/kernel/alternative.c Peter Zijlstra 2022-03-08 2403 ebebe30794d38c5 arch/x86/kernel/alternative.c Pawan Gupta 2025-05-03 2404 ibt_restore(ibt); ebebe30794d38c5 arch/x86/kernel/alternative.c Pawan Gupta 2025-05-03 2405 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki