From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 423AF312830; Thu, 27 Nov 2025 09:25:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.175.65.21 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1764235518; cv=none; b=iJe9+rokewSaY8IUODpp7BbqzL1O4Vq+yXUIAreFWgJF2768oiPHkcXVdcKcUiXTsv4s8iGepY4QtuNrVKv2ss38nNGtbJaaIHQ3J4XFi6oFEghZmxfjTZGOq0An5a3iFtCPqYpKi6blApNQ3SQn1kp3QdC2+awM5pvQBZ6b+/E= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1764235518; c=relaxed/simple; bh=KK9nzEbpI9PD/rQsiJtia1oCOmSytQ0R3vQ+5NXjJmA=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=mhRZDkGmM45oaPCHwvt9S6zkF7MD/h2Tm/SIaFnHIRnbpLLRA0AEAGoN70lpLtizoOHoqln9lvlpi8g6wuSHE+bh/DiB9Cm+h4guy1llVZQNPSXhtb+zWnGH2sB26AQIFagLiraa80b1UUi/QCFZp+GnwEqpl/cug9zn4yVwxmQ= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=lvSSc+o3; arc=none smtp.client-ip=198.175.65.21 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="lvSSc+o3" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1764235517; x=1795771517; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=KK9nzEbpI9PD/rQsiJtia1oCOmSytQ0R3vQ+5NXjJmA=; b=lvSSc+o3V2GbIKEQIrvKumIqGT5K0d75EMfBgFhu/PPpxX4AbRuyZ5Te 5bi6btljrwW3RGt80lZAWo4YurAcu47Gf8Xi/b6C12PkAi9114CFk096L 2hbGwX7cS9Rzb6l6R5JVn4lMIPXRJLUCCHxx/M3yF3+0u99ol5LcMlbI8 6uoQeNVvhJhxbjnczKRUFYdxwShRbbhzbHdl5a8bhtvhxDv8LzFG5b2PF z0mdPu/vC1MPSxcLEmQ4er0lPmR3kmZ1tVv82+P+kLkLeT01Il80/jum6 Q72EzQXEaDvnmRqhg1Rg96HG7Gati4jPOC64dsujJITEsWSvsyQELsYjr g==; X-CSE-ConnectionGUID: bf3sasWlSrysCHVxcY3dqw== X-CSE-MsgGUID: 4wFpCavnRlKdWTe35gt4UQ== X-IronPort-AV: E=McAfee;i="6800,10657,11625"; a="66226408" X-IronPort-AV: E=Sophos;i="6.20,230,1758610800"; d="scan'208";a="66226408" Received: from orviesa009.jf.intel.com ([10.64.159.149]) by orvoesa113.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Nov 2025 01:25:16 -0800 X-CSE-ConnectionGUID: URawlKB/TjiX1FSy99cnMQ== X-CSE-MsgGUID: STAbKrqQRdezH2EW5Q2Vqw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.20,230,1758610800"; d="scan'208";a="193000716" Received: from lkp-server01.sh.intel.com (HELO 4664bbef4914) ([10.239.97.150]) by orviesa009.jf.intel.com with ESMTP; 27 Nov 2025 01:25:10 -0800 Received: from kbuild by 4664bbef4914 with local (Exim 4.98.2) (envelope-from ) id 1vOYFP-000000004CN-2qrR; Thu, 27 Nov 2025 09:25:07 +0000 Date: Thu, 27 Nov 2025 17:24:18 +0800 From: kernel test robot To: Juergen Gross , linux-kernel@vger.kernel.org, x86@kernel.org, linux-hyperv@vger.kernel.org, virtualization@lists.linux.dev, kvm@vger.kernel.org Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, Juergen Gross , "K. Y. Srinivasan" , Haiyang Zhang , Wei Liu , Dexuan Cui , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , Ajay Kaher , Alexey Makhalov , Broadcom internal kernel review list , Paolo Bonzini , Vitaly Kuznetsov , Boris Ostrovsky , Josh Poimboeuf , Peter Zijlstra , xen-devel@lists.xenproject.org Subject: Re: [PATCH v4 21/21] x86/pvlocks: Move paravirt spinlock functions into own header Message-ID: <202511271747.smpLdjsz-lkp@intel.com> References: <20251127070844.21919-22-jgross@suse.com> Precedence: bulk X-Mailing-List: virtualization@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20251127070844.21919-22-jgross@suse.com> Hi Juergen, kernel test robot noticed the following build errors: [auto build test ERROR on tip/x86/core] [also build test ERROR on tip/sched/core kvm/queue kvm/next linus/master v6.18-rc7] [cannot apply to kvm/linux-next next-20251127] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Juergen-Gross/x86-paravirt-Remove-not-needed-includes-of-paravirt-h/20251127-152054 base: tip/x86/core patch link: https://lore.kernel.org/r/20251127070844.21919-22-jgross%40suse.com patch subject: [PATCH v4 21/21] x86/pvlocks: Move paravirt spinlock functions into own header config: x86_64-allnoconfig (https://download.01.org/0day-ci/archive/20251127/202511271747.smpLdjsz-lkp@intel.com/config) compiler: clang version 20.1.8 (https://github.com/llvm/llvm-project 87f0227cb60147a26a1eeb4fb06e3b505e9c7261) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20251127/202511271747.smpLdjsz-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202511271747.smpLdjsz-lkp@intel.com/ All errors (new ones prefixed by >>): >> arch/x86/kernel/alternative.c:2373:2: error: call to undeclared function 'paravirt_set_cap'; ISO C99 and later do not support implicit function declarations [-Wimplicit-function-declaration] 2373 | paravirt_set_cap(); | ^ arch/x86/kernel/alternative.c:2373:2: note: did you mean 'paravirt_ret0'? arch/x86/include/asm/paravirt-base.h:23:15: note: 'paravirt_ret0' declared here 23 | unsigned long paravirt_ret0(void); | ^ 1 error generated. vim +/paravirt_set_cap +2373 arch/x86/kernel/alternative.c 270a69c4485d7d arch/x86/kernel/alternative.c Peter Zijlstra 2023-02-08 2344 9a0b5817ad97bb arch/i386/kernel/alternative.c Gerd Hoffmann 2006-03-23 2345 void __init alternative_instructions(void) 9a0b5817ad97bb arch/i386/kernel/alternative.c Gerd Hoffmann 2006-03-23 2346 { ebebe30794d38c arch/x86/kernel/alternative.c Pawan Gupta 2025-05-03 2347 u64 ibt; ebebe30794d38c arch/x86/kernel/alternative.c Pawan Gupta 2025-05-03 2348 7457c0da024b18 arch/x86/kernel/alternative.c Peter Zijlstra 2019-05-03 2349 int3_selftest(); 7457c0da024b18 arch/x86/kernel/alternative.c Peter Zijlstra 2019-05-03 2350 7457c0da024b18 arch/x86/kernel/alternative.c Peter Zijlstra 2019-05-03 2351 /* 7457c0da024b18 arch/x86/kernel/alternative.c Peter Zijlstra 2019-05-03 2352 * The patching is not fully atomic, so try to avoid local 7457c0da024b18 arch/x86/kernel/alternative.c Peter Zijlstra 2019-05-03 2353 * interruptions that might execute the to be patched code. 7457c0da024b18 arch/x86/kernel/alternative.c Peter Zijlstra 2019-05-03 2354 * Other CPUs are not running. 7457c0da024b18 arch/x86/kernel/alternative.c Peter Zijlstra 2019-05-03 2355 */ 8f4e956b313dcc arch/i386/kernel/alternative.c Andi Kleen 2007-07-22 2356 stop_nmi(); 123aa76ec0cab5 arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2357 123aa76ec0cab5 arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2358 /* 123aa76ec0cab5 arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2359 * Don't stop machine check exceptions while patching. 123aa76ec0cab5 arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2360 * MCEs only happen when something got corrupted and in this 123aa76ec0cab5 arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2361 * case we must do something about the corruption. 32b1cbe380417f arch/x86/kernel/alternative.c Marco Ammon 2019-09-02 2362 * Ignoring it is worse than an unlikely patching race. 123aa76ec0cab5 arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2363 * Also machine checks tend to be broadcast and if one CPU 123aa76ec0cab5 arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2364 * goes into machine check the others follow quickly, so we don't 123aa76ec0cab5 arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2365 * expect a machine check to cause undue problems during to code 123aa76ec0cab5 arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2366 * patching. 123aa76ec0cab5 arch/x86/kernel/alternative.c Andi Kleen 2009-02-12 2367 */ 8f4e956b313dcc arch/i386/kernel/alternative.c Andi Kleen 2007-07-22 2368 4e6292114c7412 arch/x86/kernel/alternative.c Juergen Gross 2021-03-11 2369 /* f7af6977621a41 arch/x86/kernel/alternative.c Juergen Gross 2023-12-10 2370 * Make sure to set (artificial) features depending on used paravirt f7af6977621a41 arch/x86/kernel/alternative.c Juergen Gross 2023-12-10 2371 * functions which can later influence alternative patching. 4e6292114c7412 arch/x86/kernel/alternative.c Juergen Gross 2021-03-11 2372 */ 4e6292114c7412 arch/x86/kernel/alternative.c Juergen Gross 2021-03-11 @2373 paravirt_set_cap(); 4e6292114c7412 arch/x86/kernel/alternative.c Juergen Gross 2021-03-11 2374 ebebe30794d38c arch/x86/kernel/alternative.c Pawan Gupta 2025-05-03 2375 /* Keep CET-IBT disabled until caller/callee are patched */ ebebe30794d38c arch/x86/kernel/alternative.c Pawan Gupta 2025-05-03 2376 ibt = ibt_save(/*disable*/ true); ebebe30794d38c arch/x86/kernel/alternative.c Pawan Gupta 2025-05-03 2377 931ab63664f02b arch/x86/kernel/alternative.c Peter Zijlstra 2022-10-27 2378 __apply_fineibt(__retpoline_sites, __retpoline_sites_end, 1d7e707af44613 arch/x86/kernel/alternative.c Mike Rapoport (Microsoft 2025-01-26 2379) __cfi_sites, __cfi_sites_end, true); 026211c40b0554 arch/x86/kernel/alternative.c Kees Cook 2025-09-03 2380 cfi_debug = false; 931ab63664f02b arch/x86/kernel/alternative.c Peter Zijlstra 2022-10-27 2381 7508500900814d arch/x86/kernel/alternative.c Peter Zijlstra 2021-10-26 2382 /* 7508500900814d arch/x86/kernel/alternative.c Peter Zijlstra 2021-10-26 2383 * Rewrite the retpolines, must be done before alternatives since 7508500900814d arch/x86/kernel/alternative.c Peter Zijlstra 2021-10-26 2384 * those can rewrite the retpoline thunks. 7508500900814d arch/x86/kernel/alternative.c Peter Zijlstra 2021-10-26 2385 */ 1d7e707af44613 arch/x86/kernel/alternative.c Mike Rapoport (Microsoft 2025-01-26 2386) apply_retpolines(__retpoline_sites, __retpoline_sites_end); 1d7e707af44613 arch/x86/kernel/alternative.c Mike Rapoport (Microsoft 2025-01-26 2387) apply_returns(__return_sites, __return_sites_end); 7508500900814d arch/x86/kernel/alternative.c Peter Zijlstra 2021-10-26 2388 a82b26451de126 arch/x86/kernel/alternative.c Peter Zijlstra (Intel 2025-06-03 2389) its_fini_core(); a82b26451de126 arch/x86/kernel/alternative.c Peter Zijlstra (Intel 2025-06-03 2390) e81dc127ef6988 arch/x86/kernel/alternative.c Thomas Gleixner 2022-09-15 2391 /* ab9fea59487d8b arch/x86/kernel/alternative.c Peter Zijlstra 2025-02-07 2392 * Adjust all CALL instructions to point to func()-10, including ab9fea59487d8b arch/x86/kernel/alternative.c Peter Zijlstra 2025-02-07 2393 * those in .altinstr_replacement. e81dc127ef6988 arch/x86/kernel/alternative.c Thomas Gleixner 2022-09-15 2394 */ e81dc127ef6988 arch/x86/kernel/alternative.c Thomas Gleixner 2022-09-15 2395 callthunks_patch_builtin_calls(); e81dc127ef6988 arch/x86/kernel/alternative.c Thomas Gleixner 2022-09-15 2396 ab9fea59487d8b arch/x86/kernel/alternative.c Peter Zijlstra 2025-02-07 2397 apply_alternatives(__alt_instructions, __alt_instructions_end); ab9fea59487d8b arch/x86/kernel/alternative.c Peter Zijlstra 2025-02-07 2398 be0fffa5ca894a arch/x86/kernel/alternative.c Peter Zijlstra 2023-06-22 2399 /* be0fffa5ca894a arch/x86/kernel/alternative.c Peter Zijlstra 2023-06-22 2400 * Seal all functions that do not have their address taken. be0fffa5ca894a arch/x86/kernel/alternative.c Peter Zijlstra 2023-06-22 2401 */ 1d7e707af44613 arch/x86/kernel/alternative.c Mike Rapoport (Microsoft 2025-01-26 2402) apply_seal_endbr(__ibt_endbr_seal, __ibt_endbr_seal_end); ed53a0d971926e arch/x86/kernel/alternative.c Peter Zijlstra 2022-03-08 2403 ebebe30794d38c arch/x86/kernel/alternative.c Pawan Gupta 2025-05-03 2404 ibt_restore(ibt); ebebe30794d38c arch/x86/kernel/alternative.c Pawan Gupta 2025-05-03 2405 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki