From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 465DCC433EF for ; Wed, 12 Jan 2022 14:59:00 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id ABC926B0176; Wed, 12 Jan 2022 09:58:59 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id A6CF66B0177; Wed, 12 Jan 2022 09:58:59 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 934546B0178; Wed, 12 Jan 2022 09:58:59 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0183.hostedemail.com [216.40.44.183]) by kanga.kvack.org (Postfix) with ESMTP id 69AD66B0176 for ; Wed, 12 Jan 2022 09:58:59 -0500 (EST) Received: from smtpin03.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id E93868DA3A for ; Wed, 12 Jan 2022 14:58:58 +0000 (UTC) X-FDA: 79021942356.03.140C760 Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by imf27.hostedemail.com (Postfix) with ESMTP id 1677F4001A for ; Wed, 12 Jan 2022 14:58:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1641999538; x=1673535538; h=date:from:to:cc:subject:message-id:mime-version; bh=jNN0m3ulOMG94mOp52hDiSN7pJY4HCyagOv6Iioe3PE=; b=cyHF5BfPKeANtWMH2eEbGza1s1yGFZwhUBvKTT00idSdJvJzA2x5ONvp Q9/8UUZhwWR3MoolwJzclIyYiuO5QMWtsbzNcB7sDBrDhk7eu+x/Z/otD sy50rxcn+IXfYeuEIc+PTaec+LhZ4cSvZmf20o9e7x6NSDm+UjbwYYdJG P8nF1zc7IKIxYuaZugI0vN0cjny8BzxEmk3pkv5tDnuOcnd5gV6IaucGZ nhKNFzvRDG7pSWpt8PG6U/bDjf2xcyPvuMhMfTM1rw6qpefL2Fy2/qZRV XNZFuIjYUPnKSz2GxXpAhSbtJiodUfV8ERl+8oirdBD7GSkdG/GgTtR2r Q==; X-IronPort-AV: E=McAfee;i="6200,9189,10224"; a="268096786" X-IronPort-AV: E=Sophos;i="5.88,282,1635231600"; d="scan'208";a="268096786" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Jan 2022 06:58:56 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.88,282,1635231600"; d="scan'208";a="623467695" Received: from lkp-server01.sh.intel.com (HELO 276f1b88eecb) ([10.239.97.150]) by orsmga004.jf.intel.com with ESMTP; 12 Jan 2022 06:58:54 -0800 Received: from kbuild by 276f1b88eecb with local (Exim 4.92) (envelope-from ) id 1n7f5R-0005y9-Tp; Wed, 12 Jan 2022 14:58:53 +0000 Date: Wed, 12 Jan 2022 22:58:06 +0800 From: kernel test robot To: Jing Liu Cc: kbuild-all@lists.01.org, Linux Memory Management List , Paolo Bonzini , Yang Zhong Subject: [linux-next:master 11041/12034] arch/x86/include/asm/fpu/api.h:135:46: sparse: sparse: marked inline, but without a definition Message-ID: <202201122237.8fnwBZxc-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-Rspamd-Server: rspam05 X-Rspamd-Queue-Id: 1677F4001A X-Stat-Signature: bfgd6ormfy5za5wq3icgbpy58akepf5o Authentication-Results: imf27.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=cyHF5BfP; spf=none (imf27.hostedemail.com: domain of lkp@intel.com has no SPF policy when checking 192.55.52.88) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com X-HE-Tag: 1641999537-560715 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master head: 32ce2abb03cfae17a9eb42bd6b1b619b72f23f20 commit: 445ecdf79be0c71ca248f7611aeefceaea3ec59f [11041/12034] kvm: x86: Exclude unpermitted xfeatures at KVM_GET_SUPPORTED_CPUID config: x86_64-rhel-8.3-kselftests (https://download.01.org/0day-ci/archive/20220112/202201122237.8fnwBZxc-lkp@intel.com/config) compiler: gcc-9 (Debian 9.3.0-22) 9.3.0 reproduce: # apt-get install sparse # sparse version: v0.6.4-dirty # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=445ecdf79be0c71ca248f7611aeefceaea3ec59f git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git git fetch --no-tags linux-next master git checkout 445ecdf79be0c71ca248f7611aeefceaea3ec59f # save the config file to linux build tree mkdir build_dir make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=x86_64 SHELL=/bin/bash arch/x86/kvm/ If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot sparse warnings: (new ones prefixed by >>) arch/x86/kvm/cpuid.c: note: in included file (through arch/x86/include/asm/pgtable.h, include/linux/pgtable.h, include/linux/mm.h, ...): >> arch/x86/include/asm/fpu/api.h:135:46: sparse: sparse: marked inline, but without a definition vim +135 arch/x86/include/asm/fpu/api.h a0ff0611c2fbde Thomas Gleixner 2021-10-15 134 980fe2fddcff21 Thomas Gleixner 2022-01-05 @135 extern inline u64 xstate_get_guest_group_perm(void); 980fe2fddcff21 Thomas Gleixner 2022-01-05 136 :::::: The code at line 135 was first introduced by commit :::::: 980fe2fddcff21937c93532b4597c8ea450346c1 x86/fpu: Extend fpu_xstate_prctl() with guest permissions :::::: TO: Thomas Gleixner :::::: CC: Paolo Bonzini --- 0-DAY CI Kernel Test Service, Intel Corporation https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org