Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp4484015rdb; Fri, 29 Dec 2023 03:37:23 -0800 (PST) X-Google-Smtp-Source: AGHT+IGJ++72o7ZBkKqUvV2vsW975C5ddB7yN3iv1xaH6jAGxWFtg4bYtnu7ZlHIY8RNvhBHqJbW X-Received: by 2002:ac2:596b:0:b0:50e:75a7:6723 with SMTP id h11-20020ac2596b000000b0050e75a76723mr1636171lfp.113.1703849843530; Fri, 29 Dec 2023 03:37:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703849843; cv=none; d=google.com; s=arc-20160816; b=BpU9issZs1z9t8+S2kNE3lti3Df68DEW+N/H1yKylZJFzuYUa985TxKYsFokchhJ6f 9F5/3y5nnqE4L3I1QjR3wEQ9UgLoOSFUww8xgvUb+9uI8VfS8M14Pp9o9Ib1nWYvdwaJ yuZtPe1Prpt/EM/04yJdHg+mwuDKfQL/hAwe/IwgkZgClppciNE10zg9TwHoZ8XrtZqN RlYtAgJ6Kg06+vBtzfMthtkuAX+/WwAIPstsfpCknUHKy/52GciAVbO0adre788kUQiG k6N3YS2pm+ehL5qT5EL5Xi2IMee7RoAZTE0ze9DT12V2EXqZwlIBtfyP6xDpUiwQzCw2 s22A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=Ds1h4RcJ8Mag8Aq210LRrBMK9pjgTg7tb9CgoG1wGF0=; fh=spQb09Q9eye8nNbkDegbiJKJM0PaxlJ79vCBI/02Wtc=; b=C6gZGEsZPKm+HA6BmtPzBsHVLE0g5xpkp4fsJ6U4O56LoZkkKD7apLE6mbVAkMiuxI qoAcmc0GpnS4kJetXOoO7RyVaYbNMunKbCGTzpBfLUecW6CrcSisxhGOyrXv0hyj0zWr a0YxsK73VPZMH7AcDU1akc5bLogg83nGmwQ1qdau/1SXIYFzjRVS4GD8KN24wLvXNdJy crLdEUIlEIzd/qNcbGOOmmSHSoVBvOFkC0kt2L2zC1zZS5NTfsTzR6IK5RtNn/hGOqfO 6uYebbNnUuW3m/iB8UhfKK/1mckYxZsnyB5nQ+eTQTsWo+ZNZHYe4qqS0whfN9JlTbjm Y6DA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=bah1vHAg; spf=pass (google.com: domain of linux-kernel+bounces-13064-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-13064-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id p13-20020a170906140d00b00a235f78b047si7706550ejc.537.2023.12.29.03.37.23 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Dec 2023 03:37:23 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-13064-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=bah1vHAg; spf=pass (google.com: domain of linux-kernel+bounces-13064-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-13064-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 497621F235A6 for ; Fri, 29 Dec 2023 11:37:23 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 91A051119F; Fri, 29 Dec 2023 11:37:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="bah1vHAg" X-Original-To: linux-kernel@vger.kernel.org Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.126]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4A09510A36; Fri, 29 Dec 2023 11:37:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1703849826; x=1735385826; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=jXpLHm3Y0MAniZ7pNG5aFvqoCCSnZ/QB13PROwYSaT8=; b=bah1vHAgKd0F16QnKtzcmLBAg379AwRKSusj1s2II9twMOje6gkwGpWM yNtfSOPQX94TfmtUVVjv05tgi+Bx74U+dU/flizPFmbvC/mAa8Yab5mQX +Io+pkRXoZrw+ssI3EKjfBd1tZ9/i6oP9S6Ie9/VLqZBtS5caeQ93VYD+ WRsL9crS2fNhGlLzd2X5fQDh8hK0vtBFh2+eMUX9f45+NyedWRQI/Z3o2 PUK73ul/z9PWPItM8h3gasBnPwt2ooChlI23AzbKdeamZasGdVjQVfX7c V/rc2wcHGkOqC0XMP3hCHqf+v5lyuhEYSc+dRETaKnkbJNlRq5gr2RWsB g==; X-IronPort-AV: E=McAfee;i="6600,9927,10937"; a="381615577" X-IronPort-AV: E=Sophos;i="6.04,314,1695711600"; d="scan'208";a="381615577" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 Dec 2023 03:37:05 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10937"; a="771950637" X-IronPort-AV: E=Sophos;i="6.04,314,1695711600"; d="scan'208";a="771950637" Received: from lkp-server02.sh.intel.com (HELO b07ab15da5fe) ([10.239.97.151]) by orsmga007.jf.intel.com with ESMTP; 29 Dec 2023 03:36:59 -0800 Received: from kbuild by b07ab15da5fe with local (Exim 4.96) (envelope-from ) id 1rJBAe-000HOd-0D; Fri, 29 Dec 2023 11:36:56 +0000 Date: Fri, 29 Dec 2023 19:35:58 +0800 From: kernel test robot To: Matthew Wilcox , "Eric W. Biederman" Cc: oe-kbuild-all@lists.linux.dev, Maria Yu , kernel@quicinc.com, quic_pkondeti@quicinc.com, keescook@chromium.or, viro@zeniv.linux.org.uk, brauner@kernel.org, oleg@redhat.com, dhowells@redhat.com, jarkko@kernel.org, paul@paul-moore.com, jmorris@namei.org, serge@hallyn.com, linux-mm@kvack.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, keyrings@vger.kernel.org, linux-security-module@vger.kernel.org, linux-arm-msm@vger.kernel.org Subject: Re: Re: [PATCH] kernel: Introduce a write lock/unlock wrapper for tasklist_lock Message-ID: <202312291936.G87eGfCo-lkp@intel.com> References: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Hi Matthew, kernel test robot noticed the following build errors: [auto build test ERROR on tip/locking/core] [also build test ERROR on arnd-asm-generic/master brauner-vfs/vfs.all vfs-idmapping/for-next linus/master v6.7-rc7 next-20231222] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Matthew-Wilcox/Re-PATCH-kernel-Introduce-a-write-lock-unlock-wrapper-for-tasklist_lock/20231229-062352 base: tip/locking/core patch link: https://lore.kernel.org/r/ZY30k7OCtxrdR9oP%40casper.infradead.org patch subject: Re: [PATCH] kernel: Introduce a write lock/unlock wrapper for tasklist_lock config: i386-randconfig-011-20231229 (https://download.01.org/0day-ci/archive/20231229/202312291936.G87eGfCo-lkp@intel.com/config) compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231229/202312291936.G87eGfCo-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202312291936.G87eGfCo-lkp@intel.com/ All errors (new ones prefixed by >>): kernel/locking/spinlock_debug.c: In function 'do_raw_write_lock_irq': >> kernel/locking/spinlock_debug.c:217:9: error: implicit declaration of function 'arch_write_lock_irq'; did you mean '_raw_write_lock_irq'? [-Werror=implicit-function-declaration] 217 | arch_write_lock_irq(&lock->raw_lock); | ^~~~~~~~~~~~~~~~~~~ | _raw_write_lock_irq cc1: some warnings being treated as errors vim +217 kernel/locking/spinlock_debug.c 213 214 void do_raw_write_lock_irq(rwlock_t *lock) 215 { 216 debug_write_lock_before(lock); > 217 arch_write_lock_irq(&lock->raw_lock); 218 debug_write_lock_after(lock); 219 } 220 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki