From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6F9C3C83F28 for ; Thu, 29 Aug 2024 14:08:31 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id E13326B0089; Thu, 29 Aug 2024 10:08:30 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id DC3056B008A; Thu, 29 Aug 2024 10:08:30 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id C8A626B008C; Thu, 29 Aug 2024 10:08:30 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id AC8BF6B0089 for ; Thu, 29 Aug 2024 10:08:30 -0400 (EDT) Received: from smtpin20.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id 31B9E160F7D for ; Thu, 29 Aug 2024 14:08:30 +0000 (UTC) X-FDA: 82505463180.20.E231846 Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.20]) by imf01.hostedemail.com (Postfix) with ESMTP id C8F574001B for ; Thu, 29 Aug 2024 14:08:26 +0000 (UTC) Authentication-Results: imf01.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=ZOoUMjRN; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf01.hostedemail.com: domain of lkp@intel.com designates 198.175.65.20 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1724940486; a=rsa-sha256; cv=none; b=ro4qygdV7Pjve4JBoCLSoEIsXVBdaIBwtVOvR0FgLXHwZePT+kllTgXPTtIft359e9yKko 5UN5Qdk7zLa5CoOS3WvxRjaVrSsJDRSlK3AeQ8QgfowuJuonWTVDl4Mmh4U9+vyZ77QeUs OhXjcP0zfLfVY5QEPP3p3aQ2ROatgJg= ARC-Authentication-Results: i=1; imf01.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=ZOoUMjRN; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf01.hostedemail.com: domain of lkp@intel.com designates 198.175.65.20 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1724940486; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=vpee/8zfafDGsOkbDVy4Rypz5831P7ijZ+F6OGwXg7A=; b=iuseIiotmHTW1b9Ovtq22GFw4Nl4VVDmQz6mvcUNCI3dTC4PKbNnlN+kWfiAu77OmUx1DI VajG/op2rZimfC6HUn92aIpbd0RXGcZuvYF9c/awgHvMYsCm8PoRxJyVYlZ2rURI89nFTi 7htAAszO1/24tc+HyfYzOIyPBe/Khus= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1724940507; x=1756476507; h=date:from:to:cc:subject:message-id:mime-version; bh=fHXmG+NXRInSJmNJ6gc3UmbRtoXM/kYewLlWo8ZiA7E=; b=ZOoUMjRNuoyXepmusapMDYOtjd0CutXsY2dsB1or153j5CuaAX4ZTcR/ 6QC6k0z4d8fTdwngXS+bUP0x4NkjOM3icDLvLXWiz0e/l30lc7aAdtKJh l/nTbzhVhDwwQFuZuSiLbI5sQfLBAS+gr/37oOOBJZhG02RSri2qSWxC3 yt/9Ix0fI1uTedHtDliPIq+XZ4vMIlcOZ2cWvt2O41g5Le1RZeOP1xfvS MP95Zi+89Ovv32IKfYR3wg+goYNxF8Rt77ykqGzYDSIHntIJBUrx1S3fa JdHjHiVTFBqKbwViacR4btPbUgAlvJOnv30U7TiF5aVtDaUlIxKvdpMK6 Q==; X-CSE-ConnectionGUID: dZ8FRgYaSKCqbEH+2zDKDQ== X-CSE-MsgGUID: 6IX+LnvESBahsJTyz2nAeQ== X-IronPort-AV: E=McAfee;i="6700,10204,11179"; a="23334039" X-IronPort-AV: E=Sophos;i="6.10,185,1719903600"; d="scan'208";a="23334039" Received: from fmviesa008.fm.intel.com ([10.60.135.148]) by orvoesa112.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 Aug 2024 07:08:26 -0700 X-CSE-ConnectionGUID: H3KNAuYdQmyuLBeCoXTtzw== X-CSE-MsgGUID: gCj9fVXjRnClY874Q/h51Q== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.10,185,1719903600"; d="scan'208";a="63577324" Received: from lkp-server01.sh.intel.com (HELO 9c6b1c7d3b50) ([10.239.97.150]) by fmviesa008.fm.intel.com with ESMTP; 29 Aug 2024 07:08:24 -0700 Received: from kbuild by 9c6b1c7d3b50 with local (Exim 4.96) (envelope-from ) id 1sjfoz-0000Le-2Z; Thu, 29 Aug 2024 14:08:21 +0000 Date: Thu, 29 Aug 2024 22:07:35 +0800 From: kernel test robot To: Christian Brauner Cc: oe-kbuild-all@lists.linux.dev, Linux Memory Management List , Vlastimil Babka Subject: [linux-next:master 6694/7693] mm/slab_common.c:373: warning: Excess function parameter 'freeptr_offset' description in 'kmem_cache_create_usercopy' Message-ID: <202408292249.5oUpnCbS-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspam-User: X-Rspamd-Queue-Id: C8F574001B X-Rspamd-Server: rspam01 X-Stat-Signature: pxr8y5ta9jg9xdgf9pi6o1u1acno3xq9 X-HE-Tag: 1724940506-38806 X-HE-Meta: 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 /mfrehHw sgc3FNTWOO+y0+dkvmtLtOoldkVTIFywPEDBwa35APyXhAjrJnc+5hfcRwcRhH5dK6CV2yl888dVY4/lqGdIxeOcjS8MpO1Xi8EZ7PS6arHkVr75FhFDGT4CiVoPVIRNJ/I6X9/6v2G4Ma2TJhRElHXlummimHM1LHv3QVdPgLAim88VwWf4U7mXZ9qXz+fWVoxQsg2dxX9S605GnRW9YQ38NwQcz7F22LVqiI5/VOlTwTruXWWe98Aqf1Ote+FH5NxaC3+l0iOvBgDWg2rGSPpq70Q/EXfx47X0Nf9jz+MbcYr4K4LagItFNdxqyKP+2EaJfPaHSJI8+wZxI93M6y6ZA+28WFJ5+UUdL/44voF8QOWWA7+Anjw3hRSlZ3kLZ/ARHEteExckbOck89gLZqmtLjA== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master head: b18bbfc14a38b5234e09c2adcf713e38063a7e6e commit: 18dc9b3951080f2aefb63112b99cd6c95357a8d8 [6694/7693] mm: add kmem_cache_create_rcu() config: microblaze-randconfig-r032-20221121 (https://download.01.org/0day-ci/archive/20240829/202408292249.5oUpnCbS-lkp@intel.com/config) compiler: microblaze-linux-gcc (GCC) 13.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240829/202408292249.5oUpnCbS-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202408292249.5oUpnCbS-lkp@intel.com/ All warnings (new ones prefixed by >>): >> mm/slab_common.c:373: warning: Excess function parameter 'freeptr_offset' description in 'kmem_cache_create_usercopy' vim +373 mm/slab_common.c 338 339 /** 340 * kmem_cache_create_usercopy - Create a cache with a region suitable 341 * for copying to userspace 342 * @name: A string which is used in /proc/slabinfo to identify this cache. 343 * @size: The size of objects to be created in this cache. 344 * @freeptr_offset: Custom offset for the free pointer in RCU caches 345 * @align: The required alignment for the objects. 346 * @flags: SLAB flags 347 * @useroffset: Usercopy region offset 348 * @usersize: Usercopy region size 349 * @ctor: A constructor for the objects. 350 * 351 * Cannot be called within a interrupt, but can be interrupted. 352 * The @ctor is run when new pages are allocated by the cache. 353 * 354 * The flags are 355 * 356 * %SLAB_POISON - Poison the slab with a known test pattern (a5a5a5a5) 357 * to catch references to uninitialised memory. 358 * 359 * %SLAB_RED_ZONE - Insert `Red` zones around the allocated memory to check 360 * for buffer overruns. 361 * 362 * %SLAB_HWCACHE_ALIGN - Align the objects in this cache to a hardware 363 * cacheline. This can be beneficial if you're counting cycles as closely 364 * as davem. 365 * 366 * Return: a pointer to the cache on success, NULL on failure. 367 */ 368 struct kmem_cache * 369 kmem_cache_create_usercopy(const char *name, unsigned int size, 370 unsigned int align, slab_flags_t flags, 371 unsigned int useroffset, unsigned int usersize, 372 void (*ctor)(void *)) > 373 { 374 return do_kmem_cache_create_usercopy(name, size, UINT_MAX, align, flags, 375 useroffset, usersize, ctor); 376 } 377 EXPORT_SYMBOL(kmem_cache_create_usercopy); 378 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki