Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp309396ybn; Tue, 1 Oct 2019 21:30:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqz4lb2v5qI0bS5i2wcVktbREwazI6SqQq9JGGC/SDWt8Ob+2ZeQP3E7N/DAtxj56V1k4tlg X-Received: by 2002:a17:906:24c8:: with SMTP id f8mr1333043ejb.119.1569990651095; Tue, 01 Oct 2019 21:30:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569990651; cv=none; d=google.com; s=arc-20160816; b=Un4qtI/oQqBDLMV9tGKvw0IGqRQiVP3C0zMAJRVsYIUJ2Srv/QsXvr3VUpws3wPco8 MkFraC3z1HMinRV6y3uQVbDHPEVeG8Ae6FVW8TuAjGRKErhyASHzBTk5k565fUiA4XlZ arR9TA3L8gIW75colg4fiBk2L4qDL9FbHqmLGZC/NrjguxZosjKvDPZQhnnqFX1EijjM UapLcmZWgPBGZk7HnW07n486Iz4ZVuatSAdgYBMd5OukHu7u0c+JmSZ748uVv+5MasZu Vla8veX4MhvK/32ufJZimxOoXUsV0habQgXqucY4d5gP0bpQd6gQWRk0XbEUTX/eLjAO xNiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:message-id :subject:cc:to:from:date:dkim-signature; bh=69IayCKE1szXhC3ZreGs0zbmDsv7NL4uw8YH/4t9w9g=; b=b7qDxggKnBf+C/cJAVR+3wCbJJmpJqukSIZnVVF7v6kZG9TzLeHCbgwjY0h4ascqPv WlzAbS3/Tiq0MhR19ZkmhCcsmqKsuXwUVbLt3iKbB8TbW1mwp80kquKNHOqWXiVVEe5Y tbB+3whl1lvSRc7IYauadYc++LFjSjWMsnWb2nKZfQWyzSxW1IqK4h3B5YF0gtR8g3M7 DKYEFZJy7EAYQFJMGAKAr5PCMKu6BRWEMpo25HZBsJGHPfnAjMDyWRMWFL+5D9pMLjVR qp9zjVKci6t931TTix7bVem0uGuGlYKMe/qM8PF0Flz/vjRHRwa7ad0JjEIK+Sq9qmB3 Xd6A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=i76blzw6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id pg17si9797610ejb.288.2019.10.01.21.30.26; Tue, 01 Oct 2019 21:30:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=i76blzw6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726970AbfJAUI3 (ORCPT + 99 others); Tue, 1 Oct 2019 16:08:29 -0400 Received: from mail.kernel.org ([198.145.29.99]:33428 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726186AbfJAUI2 (ORCPT ); Tue, 1 Oct 2019 16:08:28 -0400 Received: from pobox.suse.cz (prg-ext-pat.suse.com [213.151.95.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 860652133F; Tue, 1 Oct 2019 20:08:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1569960508; bh=uYjcTl7drtwxzzmVd3X+UEiDXfBtSzTArbtfWsMZmVI=; h=Date:From:To:cc:Subject:From; b=i76blzw6W879H/mTIUJvz7MiAfUeMdzqtm79UsbyS8EAArGfR0I8H4l5XVvnXyXsX Vr9dAjUAq2p3qk+GdCe7NLU7nsdbfds5OFQO2Zsagkhf1uGzb8AJWLJdmqlJaUAr3g TPDqJZLnMRspY9k6MvyiZLcn9fj8Nyg2K746sW60= Date: Tue, 1 Oct 2019 22:08:01 +0200 (CEST) From: Jiri Kosina To: Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Masahiro Yamada , Linus Torvalds cc: linux-s390@vger.kernel.org, Michal Kubecek , linux-kernel@vger.kernel.org Subject: [PATCH 5.4-rc1 BUILD FIX] s390: mark __cpacf_query() as __always_inline Message-ID: User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org arch/s390/kvm/kvm-s390.c calls on several places __cpacf_query() directly, which makes it impossible to meet the "i" constraint for the asm operands (opcode in this case). As we are now force-enabling CONFIG_OPTIMIZE_INLINING on all architectures, this causes a build failure on s390: In file included from arch/s390/kvm/kvm-s390.c:44: ./arch/s390/include/asm/cpacf.h: In function '__cpacf_query': ./arch/s390/include/asm/cpacf.h:179:2: warning: asm operand 3 probably doesn't match constraints 179 | asm volatile( | ^~~ ./arch/s390/include/asm/cpacf.h:179:2: error: impossible constraint in 'asm' Mark __cpacf_query() as __always_inline in order to fix that, analogically how we fixes __cpacf_check_opcode(), cpacf_query_func() and scpacf_query() already. Reported-and-tested-by: Michal Kubecek Fixes: d83623c5eab2 ("s390: mark __cpacf_check_opcode() and cpacf_query_func() as __always_inline") Fixes: e60fb8bf68d4 ("s390/cpacf: mark scpacf_query() as __always_inline") Fixes: ac7c3e4ff401 ("compiler: enable CONFIG_OPTIMIZE_INLINING forcibly") Fixes: 9012d011660e ("compiler: allow all arches to enable CONFIG_OPTIMIZE_INLINING") Signed-off-by: Jiri Kosina --- I am wondering how is it possible that none of the build-testing infrastructure we have running against linux-next caught this? Not enough non-x86 coverage? arch/s390/include/asm/cpacf.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/s390/include/asm/cpacf.h b/arch/s390/include/asm/cpacf.h index a092f63aac6a..c0f3bfeddcbe 100644 --- a/arch/s390/include/asm/cpacf.h +++ b/arch/s390/include/asm/cpacf.h @@ -171,7 +171,7 @@ typedef struct { unsigned char bytes[16]; } cpacf_mask_t; * * Returns 1 if @func is available for @opcode, 0 otherwise */ -static inline void __cpacf_query(unsigned int opcode, cpacf_mask_t *mask) +static __always_inline void __cpacf_query(unsigned int opcode, cpacf_mask_t *mask) { register unsigned long r0 asm("0") = 0; /* query function */ register unsigned long r1 asm("1") = (unsigned long) mask; -- Jiri Kosina SUSE Labs