lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <201601041909.zLSDZK5R%fengguang.wu@intel.com>
Date:	Mon, 4 Jan 2016 19:56:36 +0800
From:	kbuild test robot <lkp@...el.com>
To:	"Michael S. Tsirkin" <mst@...hat.com>
Cc:	kbuild-all@...org, linux-kernel@...r.kernel.org,
	David Vrabel <david.vrabel@...rix.com>,
	Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>,
	Boris Ostrovsky <boris.ostrovsky@...cle.com>,
	Julien Grall <julien.grall@...rix.com>,
	Stefano Stabellini <stefano.stabellini@...rix.com>,
	Ross Lagerwall <ross.lagerwall@...rix.com>,
	Wei Liu <wei.liu2@...rix.com>, xen-devel@...ts.xenproject.org
Subject: Re: [PATCH] xen/events: use virt_xxx barriers

Hi Michael,

[auto build test ERROR on v4.4-rc8]
[also build test ERROR on next-20151231]
[if your patch is applied to the wrong git tree, please drop us a note to help improving the system]

url:    https://github.com/0day-ci/linux/commits/Michael-S-Tsirkin/xen-events-use-virt_xxx-barriers/20160104-194916
config: x86_64-randconfig-x008-01040711 (attached as .config)
reproduce:
        # save the attached .config to linux build tree
        make ARCH=x86_64 

All errors (new ones prefixed by >>):

   drivers/xen/events/events_fifo.c: In function 'consume_one_event':
>> drivers/xen/events/events_fifo.c:300:3: error: implicit declaration of function 'virt_rmb' [-Werror=implicit-function-declaration]
      virt_rmb(); /* Ensure word is up-to-date before reading head. */
      ^
   cc1: some warnings being treated as errors

vim +/virt_rmb +300 drivers/xen/events/events_fifo.c

   294	
   295		/*
   296		 * Reached the tail last time?  Read the new HEAD from the
   297		 * control block.
   298		 */
   299		if (head == 0) {
 > 300			virt_rmb(); /* Ensure word is up-to-date before reading head. */
   301			head = control_block->head[priority];
   302		}
   303	

---
0-DAY kernel test infrastructure                Open Source Technology Center
https://lists.01.org/pipermail/kbuild-all                   Intel Corporation

Download attachment ".config.gz" of type "application/octet-stream" (21830 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ