From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9D131C433F5 for ; Thu, 24 Feb 2022 17:46:44 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 28C2B8D0003; Thu, 24 Feb 2022 12:46:44 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 23A048D0001; Thu, 24 Feb 2022 12:46:44 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 0B4038D0003; Thu, 24 Feb 2022 12:46:44 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0115.hostedemail.com [216.40.44.115]) by kanga.kvack.org (Postfix) with ESMTP id F2A6D8D0001 for ; Thu, 24 Feb 2022 12:46:43 -0500 (EST) Received: from smtpin31.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id B5E4B4F32E2 for ; Thu, 24 Feb 2022 17:46:43 +0000 (UTC) X-FDA: 79178403486.31.4252904 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by imf29.hostedemail.com (Postfix) with ESMTP id BAF7A12001F for ; Thu, 24 Feb 2022 17:46:42 +0000 (UTC) Received: from pps.filterd (m0246629.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.16.1.2/8.16.1.2) with SMTP id 21OFOqYM016939; Thu, 24 Feb 2022 17:46:41 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=corp-2021-07-09; bh=W8g3aigv8EYc0Og3y+vvEV9jQtg7CiWYpMbJLqRgk70=; b=LtigxtjNr5DX5Jrt7Pp1JRmcanA6m8+CEGzhuyDJ6P4C11oPCPXxror5gc7zWsBF/IBC Z6OeFiK/AImRdtGYWQaQEyBPxTaGE+tj7mDExQbmoEsUuAd8uHRgoXyH8pfiaVGnkfiQ mOS9eBnJKz12J1qvP7p6BQOplA9qrxJJMl68EMvcPUs8Z8hMgU0RyOTBC6uoX034w3Iq 5fXEGm+VFHlo9V+oucLnTxqrMRh57L2SAMJp1kI3AclJIgoH0SJILWU4myYrR4ruZl0F UHyYBdGztiE1lzTWakTyrkotsMCZI1tzGFHEf8wHK1piOpMCxwa7OcVCx9PICepRtnTB Cw== Received: from aserp3020.oracle.com (aserp3020.oracle.com [141.146.126.70]) by mx0b-00069f02.pphosted.com with ESMTP id 3ect3cqwhs-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 24 Feb 2022 17:46:40 +0000 Received: from pps.filterd (aserp3020.oracle.com [127.0.0.1]) by aserp3020.oracle.com (8.16.1.2/8.16.1.2) with SMTP id 21OHeaTg120262; Thu, 24 Feb 2022 17:46:39 GMT Received: from nam10-bn7-obe.outbound.protection.outlook.com (mail-bn7nam10lp2101.outbound.protection.outlook.com [104.47.70.101]) by aserp3020.oracle.com with ESMTP id 3eb483wr23-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 24 Feb 2022 17:46:39 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=d6Sulwdn/SnU2uO1c4nDG0NPnZxFzjJSl5whwLUNra3uqWpG21vYQw6FjH6kmRJoJqAZClA14F9LsYnqzhdO5Wz5XDAC33hEtNAzLrNZLtnVUxdI/El1u4gp+m4oNhGrwM2tSBR/DW9ECv9qzYYQG8AMkHuzLSdfoPwYlsCwDUZ8ISy9EYglccRRux9XqU0DKYqV0eIbnAi3Q6j9fdLDWlkD+UZ7leC7+Lon3Dq/0VfeslDcS1NkL1rBsgmcR1g3lYomv0zkDMOG4FFEMtSIM6jQEVcXaSwHXlhaCA9B5a/gverxUmUC8Zw1JM8WvqRP6mwFwouJKD5G7U/5QWEFKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=W8g3aigv8EYc0Og3y+vvEV9jQtg7CiWYpMbJLqRgk70=; b=HSssxlrmm99etQnCaDGhAbKzOMMMS3rn0UPpI8msrfCAR3vjMMEksSWczcLzOXUv6M8Nsvtoouh0OQGje78LNZIpfvoxURPutPWBFKMHjo68oj/+1F01b169ZbAahahjWmKlRPGi7oWnRyaAVj6c+k7XDMTihxTAdHK1X6gEnIKs9hIkVbf/aQjnpEc9ResUekEXWCdmbZtURxTeK/92n02rRrDyuManjK8hqMv4RRPtkBLAEvCOjqqwbKO61Ljep2np8MijYd+xuInn2E9JHRDbs+glk8bnAjQjGbeFqSifu/RHpy2D05eO33EbfTRwtVmPbjA/slG0/ObXIGKSNg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=W8g3aigv8EYc0Og3y+vvEV9jQtg7CiWYpMbJLqRgk70=; b=W27goxJUsqpo053qcYoA14ZKhpXSswFzHb8cdXmvtFxDYZk2622e8AsDbA31YvxmDbyyj/+bl7QlElGJwlKhrbpOkP9Wwp5PmufVv3lBEQqIkho9Kedt+xdkcFYIZGjGp1kOK8YZa1P7k4SxhDm3/N9mtDimtDWGFk3XmW7Yc44= Received: from SN6PR10MB3022.namprd10.prod.outlook.com (2603:10b6:805:d8::25) by CY4PR10MB1271.namprd10.prod.outlook.com (2603:10b6:910:4::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4995.24; Thu, 24 Feb 2022 17:46:37 +0000 Received: from SN6PR10MB3022.namprd10.prod.outlook.com ([fe80::8df4:1db9:57f2:a96a]) by SN6PR10MB3022.namprd10.prod.outlook.com ([fe80::8df4:1db9:57f2:a96a%3]) with mapi id 15.20.5017.024; Thu, 24 Feb 2022 17:46:37 +0000 From: Liam Howlett To: kernel test robot CC: "kbuild-all@lists.01.org" , Linux Memory Management List Subject: Re: [linux-next:master 6850/7915] mm/mmap.c:1991:25: error: passing argument 1 of 'vma_find' from incompatible pointer type Thread-Topic: [linux-next:master 6850/7915] mm/mmap.c:1991:25: error: passing argument 1 of 'vma_find' from incompatible pointer type Thread-Index: AQHYKUTIV9itbr3x9EeQLBwIYcTA96yi+l2A Date: Thu, 24 Feb 2022 17:46:36 +0000 Message-ID: <20220224174629.hlhyp5e6fivkeg3x@revolver> References: <202202241403.qvb02FgB-lkp@intel.com> In-Reply-To: <202202241403.qvb02FgB-lkp@intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 3204d036-baa8-4e39-212e-08d9f7bd9af3 x-ms-traffictypediagnostic: CY4PR10MB1271:EE_ x-microsoft-antispam-prvs: x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: /L9HjVIApxcDuwxl6+A6Gh/NitnylT22g5YYDgom4o+Lbq6S9rCEmZzj7ttfsX3ya7RI2HG+z3qvLtGLkTOjXHsMbnmrqGJW7hFQN/CIs1EiKgGquljU6UIQ/WLXt/7IKn2K+XkuvLvMfvyAt1jdct3TSeD0Rt7anZSzyUCHRSLGO18TpfJiJHISvZIfD8h/a2S693BoZgnLHMb20BWNSz86vqaAyhOH9nOCkFuQm3tA3qm0tj25rUIlLRSe0gTpGhp8C6AkSxd98LJm5dFTGQV7+MYzYFPINl5b8p8fwSOuG3Pf2bYluvaUKdUkij0dt81jWoO2zrKZllnU+tB0F5w+127tRIu0EUkXHkVSGitdQ08XnajEBbk9p0EM0KEMFYNDn6mOPs1hEU6nZb3WeeLnmawPVnHZfz3e43ihxxDycttrXmCFxD7LFYYtYal2io7RNib3E7HSTiu7DMQ72AGewHnI8SWC4vj3oL+XljHkr2ld0R1hv4UNkvou3x0jUhdIj6ng5XC7Bur5k1/giJObKVQgbs3ERtYNvC9LLBzcwILI5BSCAbn3JxzlVgQi+SfLqWrYN9+Q2Fh50jRL58dWqwl+NFlgeE+W8F3EzEMoPCOJlKysDJ8n+f6E04UURg4OGSyWHc30fWYIy5BxStMUd1Xsv4e+FQaaE/UOBiiFAGvJ6uVdavmqlMK3vW3YoCVMfp/VMlUzvZagHzYMrrO52BHvRir6koWDmvsHU8PovWix4J+/u/5YSvF6fk6pJSucJawZeutNzQB3dtO7ZkT8NhKjkhMfBlZzDXWCRP9HG4Pusa9pNPvacE3Vsh7W0Forse0CxhaWNdIUmo/afg== x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SN6PR10MB3022.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230001)(7916004)(366004)(5660300002)(83380400001)(2906002)(54906003)(6916009)(44832011)(8936002)(6506007)(66556008)(1076003)(8676002)(86362001)(966005)(6486002)(508600001)(38070700005)(4326008)(316002)(64756008)(66446008)(66476007)(38100700002)(71200400001)(9686003)(6512007)(26005)(76116006)(186003)(91956017)(33716001)(122000001)(66946007);DIR:OUT;SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?PQxvywZ4fzvYjaoNiAqo3lpyI3c0OyO3anXWtW5WJpj0JkMSUhgV0D0FL+ui?= =?us-ascii?Q?F2kbC6kr+Awu80LzzUKEE/MbBVlFAIkoyNLKYXwWcvnku63wofNcfQlJdqoz?= =?us-ascii?Q?kxL+rZ8FnaqVdP4y6gsXQPKfA66HmvLxFjsPLmSpqD37cuyCk7tbRymFn/Bs?= =?us-ascii?Q?+HckVJJFIZh23UJufGciE9hZUaF+lMtvN5iDgIaX2HQaRzfCNeok224LyCo1?= =?us-ascii?Q?s0RDrGH1v7jK/ArBB04qoJfvkgYlf36X4TpUZbpVshVNkWGB6SGBwwcjxIu8?= =?us-ascii?Q?ovQsFL6hHtEUtR7wt7WusPGKZl7HsrZCQ2od/ZvXJHh1+x0oHoYTVXL0uPbH?= =?us-ascii?Q?WhAV+ia2n0fbct8E1NZj//r3z/KqbpZRk/zI7i/VCLHVe6OjnG8DuQQH4jyt?= =?us-ascii?Q?BrarD+WOq+KNXFcJX+PPe1miJOlSPmseBEHXG7Y5X57A+5TymVRvNHcHpOJT?= =?us-ascii?Q?kh+qmhcICGFjMWPwNhLYLvIlFZ5GOAeVc3Un2G3IuFhSu6VlqEcsAfDnJyU7?= =?us-ascii?Q?mDX0pOyaOLZIvelN6Oa6EidRZyQKOtv3U5kxB0EJv/Do/2WvoasMPe2ybJxI?= =?us-ascii?Q?rK3H652hYlNlsG9tlompLye/CqpoT5hsGYjdoLhXry5CoeL/UsLpfNm8RInl?= =?us-ascii?Q?u/P7pWmItGXStG3YVMr059sZ8zotV1nfkZcEGiZ3G9/2bl+BNqPjcDNxJUqL?= =?us-ascii?Q?k+FEeSNV+O73QqJl1g1eaa3CKiGyEb8ySAI7lK9jOvKT4ZZdRXyFKdS2k3vL?= =?us-ascii?Q?oPvHNLB4BDFeWuKCtLHzEdFOlwIQi7UPq/8npuEkVOAtEq5ZYhSmPWeSqKhu?= =?us-ascii?Q?TIgIAMDBWLcVcOgb7OnXiZVeziu4e3YHrwyY+nu/PZGmZCVdBZki/4sYhAFW?= =?us-ascii?Q?kKzsLwZk3wWekGmlMqs7q6gowVVcbTczkpZ6EKSc1xwC3vKQuEVG16JMzH5N?= =?us-ascii?Q?7HRII5Naup24MfKKO8IlrruU+9UCEyN5a88SdQI+Ieyae4OduOu87Ufw20BB?= =?us-ascii?Q?bm0HcmEU2wbxWa+VkFW+xeyxZfUkRVAMPEz19WsRToLPQYSBGHUs589zdETn?= =?us-ascii?Q?RG2kJ3x5N+o/5tpAD1XPBKSQbRDOy2e8Ybe5T0qGteCoPo1KNgRB2pf8koW4?= =?us-ascii?Q?fXDSYAHRrodHBlZk16d9S0Q/5Vv1ulAtXMCn3Z1/UjrHRU0SuDV5BSDKH1ON?= =?us-ascii?Q?nQGD0sBteYMJwKpCLhhnFGe5VGsvwWRK+7QFI9+rcncVvNTQMdPkdqb9kFeS?= =?us-ascii?Q?JZkO62k3NsRqPgFHdPzf0QRH/zRSP5vIgyYPvowJh2FO4p2/4Do6kUCk2XSR?= =?us-ascii?Q?mW+MLskcjFO92VcXf77tIplQOyO0ryDJ1HATG2CXkXnvwaRKbzpaML2lDCmT?= =?us-ascii?Q?VfY6a65Sv7wFSD0SQfbJJoIJ5Et7DHnLO8Dtew4JRV/sshPzIhEU3uGq2sjw?= =?us-ascii?Q?D4ERycyfnuYJctyHTERuga5WtLxqJmxM7LgBF64pvoj8er3Um8iJUuoDECij?= =?us-ascii?Q?fY+tQP/LOyLvvGH6II6ZywZ4lhvwbXOg/T7x0/6fp56kex+9qzSoSMaode7R?= =?us-ascii?Q?nwXrq2Tb2x+YQNgVr7u1Nec7x64BtEfFUCzy4/O2rE7mIMkrqC2R4Ho26RFB?= =?us-ascii?Q?KerrdGnKUAFD2WxQssWA1LQ=3D?= Content-Type: text/plain; charset="us-ascii" Content-ID: <5529604E3973274A8F85E892ED1921D9@namprd10.prod.outlook.com> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: SN6PR10MB3022.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 3204d036-baa8-4e39-212e-08d9f7bd9af3 X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Feb 2022 17:46:36.9359 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: oh8ZyvZ+VK3CCaN71wvd1xJpQdY5YL6f1VZGcweSea/ceH9JVTsJzI5rMXQv6dtV2soiykXh+8buelO9FOFVWA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR10MB1271 X-Proofpoint-Virus-Version: vendor=nai engine=6300 definitions=10268 signatures=684655 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 malwarescore=0 mlxlogscore=999 adultscore=0 bulkscore=0 phishscore=0 suspectscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2201110000 definitions=main-2202240099 X-Proofpoint-ORIG-GUID: xqLzDv62sa8Qpxxbk8jAF_JfN16jM-E2 X-Proofpoint-GUID: xqLzDv62sa8Qpxxbk8jAF_JfN16jM-E2 X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: BAF7A12001F X-Stat-Signature: 4f54aqb1ggj5odhdbmk9iq4k5tt6xkto Authentication-Results: imf29.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2021-07-09 header.b=LtigxtjN; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=W27goxJU; spf=none (imf29.hostedemail.com: domain of liam.howlett@oracle.com has no SPF policy when checking 205.220.165.32) smtp.mailfrom=liam.howlett@oracle.com; dmarc=pass (policy=none) header.from=oracle.com X-Rspam-User: X-HE-Tag: 1645724802-81879 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: * kernel test robot [220224 01:07]: > tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.g= it master > head: d4a0ae62a277377de396850ed4b709b6bd9b7326 > commit: b3d7ba3cdf23cae36715a695c7569f617e57d39d [6850/7915] mm: Remove t= he vma linked list > config: parisc-randconfig-r015-20220223 (https://download.01.org/0day-ci/= archive/20220224/202202241403.qvb02FgB-lkp@intel.com/config) > compiler: hppa-linux-gcc (GCC) 11.2.0 > reproduce (this is a W=3D1 build): > wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbi= n/make.cross -O ~/bin/make.cross > chmod +x ~/bin/make.cross > # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next= .git/commit/?id=3Db3d7ba3cdf23cae36715a695c7569f617e57d39d > git remote add linux-next https://git.kernel.org/pub/scm/linux/ke= rnel/git/next/linux-next.git > git fetch --no-tags linux-next master > git checkout b3d7ba3cdf23cae36715a695c7569f617e57d39d > # save the config file to linux build tree > mkdir build_dir > COMPILER_INSTALL_PATH=3D$HOME/0day COMPILER=3Dgcc-11.2.0 make.cro= ss O=3Dbuild_dir ARCH=3Dparisc SHELL=3D/bin/bash >=20 > If you fix the issue, kindly add following tag as appropriate > Reported-by: kernel test robot >=20 > All errors (new ones prefixed by >>): >=20 > mm/mmap.c:515:6: warning: no previous prototype for 'vma_store' [-Wmis= sing-prototypes] > 515 | void vma_store(struct mm_struct *mm, struct vm_area_struct *vm= a) > | ^~~~~~~~~ > mm/mmap.c: In function 'expand_upwards': > >> mm/mmap.c:1991:25: error: passing argument 1 of 'vma_find' from incomp= atible pointer type [-Werror=3Dincompatible-pointer-types] > 1991 | next =3D vma_find(mm, vma->vm_end); > | ^~ > | | > | struct mm_struct * Thank you, this has already been fixed. > In file included from arch/parisc/include/asm/cacheflush.h:5, > from include/linux/cacheflush.h:5, > from include/linux/highmem.h:8, > from include/linux/bvec.h:10, > from include/linux/blk_types.h:10, > from include/linux/writeback.h:13, > from include/linux/backing-dev.h:16, > from mm/mmap.c:14: > include/linux/mm.h:659:54: note: expected 'struct vma_iterator *' but = argument is of type 'struct mm_struct *' > 659 | struct vm_area_struct *vma_find(struct vma_iterator *vmi, unsi= gned long max) > | ~~~~~~~~~~~~~~~~~~~~~^~~ > cc1: some warnings being treated as errors >=20 >=20 > vim +/vma_find +1991 mm/mmap.c >=20 > 1962=09 > 1963 #if defined(CONFIG_STACK_GROWSUP) || defined(CONFIG_IA64) > 1964 /* > 1965 * PA-RISC uses this for its stack; IA64 for its Register Backing = Store. > 1966 * vma is the last one with address > vma->vm_end. Have to extend= vma. > 1967 */ > 1968 int expand_upwards(struct vm_area_struct *vma, unsigned long addre= ss) > 1969 { > 1970 struct mm_struct *mm =3D vma->vm_mm; > 1971 struct vm_area_struct *next; > 1972 unsigned long gap_addr; > 1973 int error =3D 0; > 1974=09 > 1975 if (!(vma->vm_flags & VM_GROWSUP)) > 1976 return -EFAULT; > 1977=09 > 1978 /* Guard against exceeding limits of the address space. */ > 1979 address &=3D PAGE_MASK; > 1980 if (address >=3D (TASK_SIZE & PAGE_MASK)) > 1981 return -ENOMEM; > 1982 address +=3D PAGE_SIZE; > 1983=09 > 1984 /* Enforce stack_guard_gap */ > 1985 gap_addr =3D address + stack_guard_gap; > 1986=09 > 1987 /* Guard against overflow */ > 1988 if (gap_addr < address || gap_addr > TASK_SIZE) > 1989 gap_addr =3D TASK_SIZE; > 1990=09 > > 1991 next =3D vma_find(mm, vma->vm_end); > 1992 if (next && next->vm_start < gap_addr && vma_is_accessible(next))= { > 1993 if (!(next->vm_flags & VM_GROWSUP)) > 1994 return -ENOMEM; > 1995 /* Check that both stack segments have the same anon_vma? */ > 1996 } > 1997=09 > 1998 /* We must make sure the anon_vma is allocated. */ > 1999 if (unlikely(anon_vma_prepare(vma))) > 2000 return -ENOMEM; > 2001=09 > 2002 /* > 2003 * vma->vm_start/vm_end cannot change under us because the caller > 2004 * is required to hold the mmap_lock in read mode. We need the > 2005 * anon_vma lock to serialize against concurrent expand_stacks. > 2006 */ > 2007 anon_vma_lock_write(vma->anon_vma); > 2008=09 > 2009 /* Somebody else might have raced and expanded it already */ > 2010 if (address > vma->vm_end) { > 2011 unsigned long size, grow; > 2012=09 > 2013 size =3D address - vma->vm_start; > 2014 grow =3D (address - vma->vm_end) >> PAGE_SHIFT; > 2015=09 > 2016 error =3D -ENOMEM; > 2017 if (vma->vm_pgoff + (size >> PAGE_SHIFT) >=3D vma->vm_pgoff) { > 2018 error =3D acct_stack_growth(vma, size, grow); > 2019 if (!error) { > 2020 /* > 2021 * We only hold a shared mmap_lock lock here, so > 2022 * we need to protect against concurrent vma > 2023 * expansions. anon_vma_lock_write() doesn't > 2024 * help here, as we don't guarantee that all > 2025 * growable vmas in a mm share the same root > 2026 * anon vma. So, we reuse mm->page_table_lock > 2027 * to guard against concurrent vma expansions. > 2028 */ > 2029 spin_lock(&mm->page_table_lock); > 2030 if (vma->vm_flags & VM_LOCKED) > 2031 mm->locked_vm +=3D grow; > 2032 vm_stat_account(mm, vma->vm_flags, grow); > 2033 anon_vma_interval_tree_pre_update_vma(vma); > 2034 vma->vm_end =3D address; > 2035 vma_store(mm, vma); > 2036 anon_vma_interval_tree_post_update_vma(vma); > 2037 spin_unlock(&mm->page_table_lock); > 2038=09 > 2039 perf_event_mmap(vma); > 2040 } > 2041 } > 2042 } > 2043 anon_vma_unlock_write(vma->anon_vma); > 2044 khugepaged_enter_vma_merge(vma, vma->vm_flags); > 2045 return error; > 2046 } > 2047 #endif /* CONFIG_STACK_GROWSUP || CONFIG_IA64 */ > 2048=09 >=20 > --- > 0-DAY CI Kernel Test Service, Intel Corporation > https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org=