From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id A10ACC433EF for ; Sat, 27 Nov 2021 11:04:14 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id DDDA56B0075; Sat, 27 Nov 2021 06:04:03 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id D8E156B0078; Sat, 27 Nov 2021 06:04:03 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id C7C0D6B007B; Sat, 27 Nov 2021 06:04:03 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0133.hostedemail.com [216.40.44.133]) by kanga.kvack.org (Postfix) with ESMTP id B8E4E6B0075 for ; Sat, 27 Nov 2021 06:04:03 -0500 (EST) Received: from smtpin23.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id 68C438EBE7 for ; Sat, 27 Nov 2021 11:03:53 +0000 (UTC) X-FDA: 78854425146.23.E18554B Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by imf07.hostedemail.com (Postfix) with ESMTP id 3825A10000B9 for ; Sat, 27 Nov 2021 11:03:47 +0000 (UTC) X-IronPort-AV: E=McAfee;i="6200,9189,10180"; a="234485750" X-IronPort-AV: E=Sophos;i="5.87,269,1631602800"; d="scan'208";a="234485750" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Nov 2021 03:03:50 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.87,269,1631602800"; d="scan'208";a="458497708" Received: from lkp-server02.sh.intel.com (HELO 9e1e9f9b3bcb) ([10.239.97.151]) by orsmga006.jf.intel.com with ESMTP; 27 Nov 2021 03:03:47 -0800 Received: from kbuild by 9e1e9f9b3bcb with local (Exim 4.92) (envelope-from ) id 1mqvUg-0009Ov-Vu; Sat, 27 Nov 2021 11:03:46 +0000 Date: Sat, 27 Nov 2021 19:03:27 +0800 From: kernel test robot To: Kefeng Wang Cc: kbuild-all@lists.01.org, Linux Memory Management List , Andrew Morton Subject: [linux-next:master 3421/3897] mm/kasan/shadow.c:528:33: error: 'VM_DELAY_KMEMLEAK' undeclared; did you mean 'VM_DEFER_KMEMLEAK'? Message-ID: <202111271833.jSwKL4dZ-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-Rspamd-Server: rspam06 X-Rspamd-Queue-Id: 3825A10000B9 X-Stat-Signature: srwkbxtt8njr3nn4xe8hjdqb7bqe5q4u Authentication-Results: imf07.hostedemail.com; dkim=none; spf=none (imf07.hostedemail.com: domain of lkp@intel.com has no SPF policy when checking 192.55.52.120) smtp.mailfrom=lkp@intel.com; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=intel.com (policy=none) X-HE-Tag: 1638011027-199944 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master head: f30a24ed97b401416118756fa35fbe5d28f999e3 commit: f61bc9ffcab1688372969e3cbb36cab83f045c22 [3421/3897] mm: defer kmemleak object creation of module_alloc() config: xtensa-allyesconfig (https://download.01.org/0day-ci/archive/20211127/202111271833.jSwKL4dZ-lkp@intel.com/config) compiler: xtensa-linux-gcc (GCC) 11.2.0 reproduce (this is a W=1 build): wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=f61bc9ffcab1688372969e3cbb36cab83f045c22 git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git git fetch --no-tags linux-next master git checkout f61bc9ffcab1688372969e3cbb36cab83f045c22 # save the config file to linux build tree mkdir build_dir COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-11.2.0 make.cross O=build_dir ARCH=xtensa SHELL=/bin/bash If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot Note: the linux-next/master HEAD f30a24ed97b401416118756fa35fbe5d28f999e3 builds fine. It may have been fixed somewhere. All errors (new ones prefixed by >>): mm/kasan/shadow.c: In function 'kasan_module_alloc': >> mm/kasan/shadow.c:528:33: error: 'VM_DELAY_KMEMLEAK' undeclared (first use in this function); did you mean 'VM_DEFER_KMEMLEAK'? 528 | if (vm->flags & VM_DELAY_KMEMLEAK) | ^~~~~~~~~~~~~~~~~ | VM_DEFER_KMEMLEAK mm/kasan/shadow.c:528:33: note: each undeclared identifier is reported only once for each function it appears in vim +528 mm/kasan/shadow.c 500 501 int kasan_module_alloc(void *addr, size_t size, gfp_t gfp_mask) 502 { 503 void *ret; 504 size_t scaled_size; 505 size_t shadow_size; 506 unsigned long shadow_start; 507 508 shadow_start = (unsigned long)kasan_mem_to_shadow(addr); 509 scaled_size = (size + KASAN_GRANULE_SIZE - 1) >> 510 KASAN_SHADOW_SCALE_SHIFT; 511 shadow_size = round_up(scaled_size, PAGE_SIZE); 512 513 if (WARN_ON(!PAGE_ALIGNED(shadow_start))) 514 return -EINVAL; 515 516 ret = __vmalloc_node_range(shadow_size, 1, shadow_start, 517 shadow_start + shadow_size, 518 GFP_KERNEL, 519 PAGE_KERNEL, VM_NO_GUARD, NUMA_NO_NODE, 520 __builtin_return_address(0)); 521 522 if (ret) { 523 struct vm_struct *vm = find_vm_area(addr); 524 __memset(ret, KASAN_SHADOW_INIT, shadow_size); 525 vm->flags |= VM_KASAN; 526 kmemleak_ignore(ret); 527 > 528 if (vm->flags & VM_DELAY_KMEMLEAK) 529 kmemleak_vmalloc(vm, size, gfp_mask); 530 531 return 0; 532 } 533 534 return -ENOMEM; 535 } 536 --- 0-DAY CI Kernel Test Service, Intel Corporation https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org