From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 857E4C27C6E for ; Fri, 14 Jun 2024 21:14:06 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id BE97B6B015B; Fri, 14 Jun 2024 17:09:30 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id B98EB6B0163; Fri, 14 Jun 2024 17:09:30 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A5FC36B0167; Fri, 14 Jun 2024 17:09:30 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id 87ACF6B015B for ; Fri, 14 Jun 2024 17:09:30 -0400 (EDT) Received: from smtpin10.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id B3EEB1C143B for ; Fri, 14 Jun 2024 21:09:29 +0000 (UTC) X-FDA: 82230735258.10.D8A5D0F Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.19]) by imf22.hostedemail.com (Postfix) with ESMTP id 2F3F6C0012 for ; Fri, 14 Jun 2024 21:09:26 +0000 (UTC) Authentication-Results: imf22.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=nUs7wPBm; spf=pass (imf22.hostedemail.com: domain of lkp@intel.com designates 198.175.65.19 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1718399365; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=cy5cG0mXzeAv6hfBzcmnGGJfKlthb28GV7edzkjlMHY=; b=eGBjuQpSBY4NwaY2MaRWw/0mcgC+M7RMLdq/U94kJbqegt8D+lexRqUV+PQnPhn8/rlV5k bTPHNV7nRwGHXHoqe0eGgC4s/ACRcjQGCdw6XS5kCXOxNcgeiEPOz0bNCEuPbOt9I1YD9b XknbAMGCaF9mIFL9gVyHWxjLD7hOULA= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1718399365; a=rsa-sha256; cv=none; b=PImZF0TbTNqTr5VxM2UyC12w8nM3NZfTYzpuPMCR3lLXTGcVSqNOEgiCYBGV5Fv7LT/ltp R4iWjszZ9x61COFaNsOSkUKz4NPGyiramj1Zb0x6uX0PKGpeFfNXEQQ/iuVPrrRrI8F8sq MUd2ILeal3hJGzzO2xrCEsijQ1fFrUg= ARC-Authentication-Results: i=1; imf22.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=nUs7wPBm; spf=pass (imf22.hostedemail.com: domain of lkp@intel.com designates 198.175.65.19 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1718399368; x=1749935368; h=date:from:to:cc:subject:message-id:mime-version; bh=FNq86m2+L/Y8MguLbUnC6HoD3GqL1CauBRcwa9sF4GA=; b=nUs7wPBm7ZzMmHigOPLfL5WoAz2q1WY5qG2q7ZAmIDI+dUBPKJIrqT+9 wBBJRytQYV5S0gqOEfGkrMLxQKqSrNIqnRZmIKd+yzopGAyDDkrBA77zq iLnAm6VyynophuhYSx1MQUoB93jDQ9CcSo7YDZmRl0hrHnzEgWJf/k12W 72OfC9O70WPzK4oaiqdfEZwC6We6PrI8HYEnOp9xk1kOD98AOseeUDnor YNYd3RozQXJ6sP1Ur4Qkfk1pE9+tIkQsGyQ86Hc0awnD5YeEHj3AE3NUg C8Ga1T6bjoPSFjwf+YHdikJSDSrjAXb9I+uGcDc8YaKGah8bpWQ7sl0SN Q==; X-CSE-ConnectionGUID: 5jZ+dVSwR+2sG2cdFrICIw== X-CSE-MsgGUID: AVaIhxWdSR+NnHO9hA6T5g== X-IronPort-AV: E=McAfee;i="6700,10204,11103"; a="15141720" X-IronPort-AV: E=Sophos;i="6.08,238,1712646000"; d="scan'208";a="15141720" Received: from orviesa001.jf.intel.com ([10.64.159.141]) by orvoesa111.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Jun 2024 14:09:26 -0700 X-CSE-ConnectionGUID: FBxTe8TwQ5OCB8N3E2Vs9g== X-CSE-MsgGUID: JDLnadtmSGipZJW8EiIzWA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.08,238,1712646000"; d="scan'208";a="78095555" Received: from lkp-server01.sh.intel.com (HELO 9e3ee4e9e062) ([10.239.97.150]) by orviesa001.jf.intel.com with ESMTP; 14 Jun 2024 14:09:23 -0700 Received: from kbuild by 9e3ee4e9e062 with local (Exim 4.96) (envelope-from ) id 1sIEAi-0001nZ-2L; Fri, 14 Jun 2024 21:09:20 +0000 Date: Sat, 15 Jun 2024 05:08:36 +0800 From: kernel test robot To: Suren Baghdasaryan Cc: oe-kbuild-all@lists.linux.dev, linux-kernel@vger.kernel.org, Andrew Morton , Linux Memory Management List , Kent Overstreet , Kees Cook , Vlastimil Babka Subject: mm/slub.c:3905:29: error: variable 'obj_exts' set but not used Message-ID: <202406150444.F6neSaiy-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspamd-Queue-Id: 2F3F6C0012 X-Stat-Signature: cbhidsaae8ks3jx11c7ybhan15ic1n3u X-Rspamd-Server: rspam09 X-Rspam-User: X-HE-Tag: 1718399366-995635 X-HE-Meta: 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 fNpvVNF1 BUhnygblsYegv13E+I8j9wopiQcyc3OVcPRbARxbg3v+wWhjHwSlcvBkZ7Jq+5Yign5XmuddJmvRZVRbnBESDrYpEun5FX8441Ib342F2x0NL7Q8c65pRpfv2zGcNZV9FMgI57K+6oQnkq8tAEUyF91jGz7W0mFQNKeBA799Hbe1Ad1IamljteMoK79xzRsZ66g21jUNQzn/LJSfbJQEhEz/us3qHwoy5K6oubqYqMn3NWR/sH3NP9wTUabfoGAT+OgP30bchbOHju2zh7ZnTSpQfcL0SYLpGfR+oL6PxHnnTvbaRIlIGUS8YHdJ1yGeR47Bi+typAzOmfHWZPrY17d5EKEndjnALUf8qOEEHjJ6fT8Kj+vasCLGsu8webnY+rUz9 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master head: c286c21ff94252f778515b21b6bebe749454a852 commit: 4b8736964640fe160724e7135dc62883bddcdace mm/slab: add allocation accounting into slab allocation and free paths date: 7 weeks ago config: x86_64-sof-customedconfig-atom-defconfig (https://download.01.org/0day-ci/archive/20240615/202406150444.F6neSaiy-lkp@intel.com/config) compiler: gcc-11 (Ubuntu 11.4.0-4ubuntu1) 11.4.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240615/202406150444.F6neSaiy-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202406150444.F6neSaiy-lkp@intel.com/ All errors (new ones prefixed by >>): mm/slub.c: In function 'slab_post_alloc_hook': >> mm/slub.c:3905:29: error: variable 'obj_exts' set but not used [-Werror=unused-but-set-variable] 3905 | struct slabobj_ext *obj_exts; | ^~~~~~~~ cc1: all warnings being treated as errors vim +/obj_exts +3905 mm/slub.c 3898 3899 static __fastpath_inline 3900 void slab_post_alloc_hook(struct kmem_cache *s, struct obj_cgroup *objcg, 3901 gfp_t flags, size_t size, void **p, bool init, 3902 unsigned int orig_size) 3903 { 3904 unsigned int zero_size = s->object_size; > 3905 struct slabobj_ext *obj_exts; 3906 bool kasan_init = init; 3907 size_t i; 3908 gfp_t init_flags = flags & gfp_allowed_mask; 3909 3910 /* 3911 * For kmalloc object, the allocated memory size(object_size) is likely 3912 * larger than the requested size(orig_size). If redzone check is 3913 * enabled for the extra space, don't zero it, as it will be redzoned 3914 * soon. The redzone operation for this extra space could be seen as a 3915 * replacement of current poisoning under certain debug option, and 3916 * won't break other sanity checks. 3917 */ 3918 if (kmem_cache_debug_flags(s, SLAB_STORE_USER | SLAB_RED_ZONE) && 3919 (s->flags & SLAB_KMALLOC)) 3920 zero_size = orig_size; 3921 3922 /* 3923 * When slab_debug is enabled, avoid memory initialization integrated 3924 * into KASAN and instead zero out the memory via the memset below with 3925 * the proper size. Otherwise, KASAN might overwrite SLUB redzones and 3926 * cause false-positive reports. This does not lead to a performance 3927 * penalty on production builds, as slab_debug is not intended to be 3928 * enabled there. 3929 */ 3930 if (__slub_debug_enabled()) 3931 kasan_init = false; 3932 3933 /* 3934 * As memory initialization might be integrated into KASAN, 3935 * kasan_slab_alloc and initialization memset must be 3936 * kept together to avoid discrepancies in behavior. 3937 * 3938 * As p[i] might get tagged, memset and kmemleak hook come after KASAN. 3939 */ 3940 for (i = 0; i < size; i++) { 3941 p[i] = kasan_slab_alloc(s, p[i], init_flags, kasan_init); 3942 if (p[i] && init && (!kasan_init || 3943 !kasan_has_integrated_init())) 3944 memset(p[i], 0, zero_size); 3945 kmemleak_alloc_recursive(p[i], s->object_size, 1, 3946 s->flags, init_flags); 3947 kmsan_slab_alloc(s, p[i], init_flags); 3948 if (need_slab_obj_ext()) { 3949 obj_exts = prepare_slab_obj_exts_hook(s, flags, p[i]); 3950 #ifdef CONFIG_MEM_ALLOC_PROFILING 3951 /* 3952 * Currently obj_exts is used only for allocation profiling. 3953 * If other users appear then mem_alloc_profiling_enabled() 3954 * check should be added before alloc_tag_add(). 3955 */ 3956 if (likely(obj_exts)) 3957 alloc_tag_add(&obj_exts->ref, current->alloc_tag, s->size); 3958 #endif 3959 } 3960 } 3961 3962 memcg_slab_post_alloc_hook(s, objcg, flags, size, p); 3963 } 3964 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki