From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 90E06C433F5 for ; Thu, 13 Jan 2022 07:34:40 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id E4B1D6B0088; Thu, 13 Jan 2022 02:34:39 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id DFA8B6B0089; Thu, 13 Jan 2022 02:34:39 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id CC2106B008A; Thu, 13 Jan 2022 02:34:39 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0125.hostedemail.com [216.40.44.125]) by kanga.kvack.org (Postfix) with ESMTP id B9B3E6B0088 for ; Thu, 13 Jan 2022 02:34:39 -0500 (EST) Received: from smtpin20.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay03.hostedemail.com (Postfix) with ESMTP id 780778093D35 for ; Thu, 13 Jan 2022 07:34:39 +0000 (UTC) X-FDA: 79024451478.20.0A67286 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by imf30.hostedemail.com (Postfix) with ESMTP id C5D2B80007 for ; Thu, 13 Jan 2022 07:34:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1642059278; x=1673595278; h=date:from:to:cc:subject:message-id:mime-version; bh=rFvEvIxd2OfYP6gHXC/RgPWvoK+IgtyKHeowz/nJ5UE=; b=DaZ5CFzMbCSrUms0iGBuq7Son+9u44L71gLfT+xiY7kvimXTdQ/+4Rvn A4zfs3m4yt1Lw75awjc18/UQ4Ts6p7Y1sZam1wO+sy3buHxKgrLbVsknP uU9EHToVdgCduUbsZKFIGG6mw9P3BXOEq/9Y59hjW2qy7UvalkO4ujFVH sQv8JYz62T8l6op9Kish4eo39qOubMhb+4A5lXwC2zXmbWRocrw4E3aUf WK6x+kzicXeWmF3nBDVH03lZVt5oGHjXgMEkL3ObVZ8+BFJJw0Ddh5x3/ N91CuyiMaUHNytG5rFGQRUcaw2+S5o/SH9+8gPUWkjguc+R/o1lLHmAwM w==; X-IronPort-AV: E=McAfee;i="6200,9189,10225"; a="307297945" X-IronPort-AV: E=Sophos;i="5.88,284,1635231600"; d="scan'208";a="307297945" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Jan 2022 23:34:37 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.88,284,1635231600"; d="scan'208";a="670430423" Received: from lkp-server01.sh.intel.com (HELO 276f1b88eecb) ([10.239.97.150]) by fmsmga001.fm.intel.com with ESMTP; 12 Jan 2022 23:34:35 -0800 Received: from kbuild by 276f1b88eecb with local (Exim 4.92) (envelope-from ) id 1n7ud1-0006xN-1F; Thu, 13 Jan 2022 07:34:35 +0000 Date: Thu, 13 Jan 2022 15:33:55 +0800 From: kernel test robot To: Jing Liu Cc: kbuild-all@lists.01.org, Linux Memory Management List , Paolo Bonzini , Yang Zhong Subject: [linux-next:master 11002/12117] arch/x86/include/asm/fpu/api.h:135:46: sparse: sparse: marked inline, but without a definition Message-ID: <202201131512.9MWl7fOZ-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-Rspamd-Server: rspam05 X-Rspamd-Queue-Id: C5D2B80007 X-Stat-Signature: npbqs5yi3amdd5kp8jcczcnz8eon8g4a Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=DaZ5CFzM; spf=none (imf30.hostedemail.com: domain of lkp@intel.com has no SPF policy when checking 134.134.136.100) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com X-HE-Tag: 1642059278-773350 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master head: 27c9d5b3c24af29de643533984f1ba3e650c7c78 commit: 445ecdf79be0c71ca248f7611aeefceaea3ec59f [11002/12117] kvm: x86: Exclude unpermitted xfeatures at KVM_GET_SUPPORTED_CPUID config: x86_64-rhel-8.3-kselftests (https://download.01.org/0day-ci/archive/20220113/202201131512.9MWl7fOZ-lkp@intel.com/config) compiler: gcc-9 (Debian 9.3.0-22) 9.3.0 reproduce: # apt-get install sparse # sparse version: v0.6.4-dirty # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=445ecdf79be0c71ca248f7611aeefceaea3ec59f git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git git fetch --no-tags linux-next master git checkout 445ecdf79be0c71ca248f7611aeefceaea3ec59f # save the config file to linux build tree mkdir build_dir make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=x86_64 SHELL=/bin/bash arch/x86/kvm/ If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot sparse warnings: (new ones prefixed by >>) arch/x86/kvm/cpuid.c: note: in included file (through arch/x86/include/asm/pgtable.h, include/linux/pgtable.h, include/linux/mm.h, ...): >> arch/x86/include/asm/fpu/api.h:135:46: sparse: sparse: marked inline, but without a definition vim +135 arch/x86/include/asm/fpu/api.h a0ff0611c2fbde Thomas Gleixner 2021-10-15 134 980fe2fddcff21 Thomas Gleixner 2022-01-05 @135 extern inline u64 xstate_get_guest_group_perm(void); 980fe2fddcff21 Thomas Gleixner 2022-01-05 136 :::::: The code at line 135 was first introduced by commit :::::: 980fe2fddcff21937c93532b4597c8ea450346c1 x86/fpu: Extend fpu_xstate_prctl() with guest permissions :::::: TO: Thomas Gleixner :::::: CC: Paolo Bonzini --- 0-DAY CI Kernel Test Service, Intel Corporation https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org