From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id C33C9E7716F for ; Thu, 5 Dec 2024 00:40:19 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 422FF6B0089; Wed, 4 Dec 2024 19:40:19 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 3D1706B008A; Wed, 4 Dec 2024 19:40:19 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 271F76B008C; Wed, 4 Dec 2024 19:40:19 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id 074E66B0089 for ; Wed, 4 Dec 2024 19:40:19 -0500 (EST) Received: from smtpin03.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay09.hostedemail.com (Postfix) with ESMTP id AB87781274 for ; Thu, 5 Dec 2024 00:40:18 +0000 (UTC) X-FDA: 82859048244.03.6287E8D Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.21]) by imf01.hostedemail.com (Postfix) with ESMTP id 596F04000A for ; Thu, 5 Dec 2024 00:40:04 +0000 (UTC) Authentication-Results: imf01.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=JNTG5Xn+; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf01.hostedemail.com: domain of lkp@intel.com designates 198.175.65.21 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1733359209; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=qBxQ8d0fKCoQA/lvqy0s8ixNA2RCneJAuXtCPxvm/Ho=; b=bEIQR68RqhUuPeflFGdQ4SCHBCAXq2znAwHClslXRiCikqWZ83Y5azIT75V1kZZL7/yLd8 UjA8n66Z+etGZUaAZdkQyQwHIFqahJQwAUsrWwofmWXRlnOCxKB1Z23IiBqHQMA/oNvtV0 hDS1ZAaJAly7YXJvx6kdgOZdSIIQ+fE= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1733359209; a=rsa-sha256; cv=none; b=q08e97WIVhH2d3nUYKfG4Se2FiJ0axwDkbdV1yxcvVM/uJ3VOM/Ow4gIjR+m0cJQEmH00C c/jfkdYOc4hvuv5KPt+AuaWtA0iXRzo7YoN1bnIL6LsGpq9acqbxMONhonhGC8u9W318GK jiESo48QL4jnnAOSq8mEMIqRWl+heCo= ARC-Authentication-Results: i=1; imf01.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=JNTG5Xn+; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf01.hostedemail.com: domain of lkp@intel.com designates 198.175.65.21 as permitted sender) smtp.mailfrom=lkp@intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1733359216; x=1764895216; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=mG2/zhGPqNVr78ILSZ3rJnbvaMCbLegracNoJbp/+m4=; b=JNTG5Xn+xS4Ri8Swop3l9P9o1CTa+eplxOHAMFwKjyl71rSKmvnuysUg qaGQDZFbNhjYlbf9HRrWxvmU9kEifSg06psr/78YgkDv0+SZMquX5KKQp f1jCONIAn2x2Gi4o+KCvIxI13rzlWIzWuzoKFgJyNTTUw8nRHHjfAzbra eqLPoaRQug6/eJcbADTxzLXx/2kNgR/qiXJOTmmbwVTkhQayFIGqlp5uY VHOLVd/qCxkvlvaly+H85u9Ba/Pc9YbXyG9VpoWU6+krVOEi0CBUuB03t jwXwWOhiiV6cEKJcrJnBf40heJzLG/kOsSCGlH8dOglHU+0mVBYF5I3Gd A==; X-CSE-ConnectionGUID: XrydBlyyQEibQ9NxsFbNrQ== X-CSE-MsgGUID: rrW7L5KKRvqACHmEMTEeyg== X-IronPort-AV: E=McAfee;i="6700,10204,11276"; a="33566620" X-IronPort-AV: E=Sophos;i="6.12,208,1728975600"; d="scan'208";a="33566620" Received: from orviesa004.jf.intel.com ([10.64.159.144]) by orvoesa113.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Dec 2024 16:40:14 -0800 X-CSE-ConnectionGUID: JgIFkJ+OSA+hVohjdSZxBA== X-CSE-MsgGUID: Z3Yx0UPpTFWgMyejkxZtxg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.12,208,1728975600"; d="scan'208";a="99003200" Received: from lkp-server02.sh.intel.com (HELO 1f5a171d57e2) ([10.239.97.151]) by orviesa004.jf.intel.com with ESMTP; 04 Dec 2024 16:40:12 -0800 Received: from kbuild by 1f5a171d57e2 with local (Exim 4.96) (envelope-from ) id 1tIzub-0003cX-2L; Thu, 05 Dec 2024 00:40:09 +0000 Date: Thu, 5 Dec 2024 08:39:25 +0800 From: kernel test robot To: Guillaume Morin , linux-kernel@vger.kernel.org Cc: oe-kbuild-all@lists.linux.dev, linux-mm@kvack.org, guillaume@morinfr.org, Muchun Song , Andrew Morton , Peter Xu , David Hildenbrand , Eric Hagberg Subject: Re: [PATCH v1] hugetlb: support FOLL_FORCE|FOLL_WRITE Message-ID: <202412050840.umPPa7cK-lkp@intel.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Stat-Signature: xfs1fapp6bk5u56g5inq3puj1paszu33 X-Rspamd-Queue-Id: 596F04000A X-Rspam-User: X-Rspamd-Server: rspam01 X-HE-Tag: 1733359204-721519 X-HE-Meta: U2FsdGVkX1+6qjerP26eHrW3JsDb7FfTVBJgx2qYf/oxxZSsoscbbLj9pVJEZ4dPen0xzHdh63jv96n0EM1HNAKbhSa7Y9pdiuGF8u/FCG9/KRP9bd+PtWbezrbLaGa0NayhFKhdOkyNEtByE3mwACbz8Z0+xIGn6AOO3zOb+D6bkd8hc1+3Tuo0qp2zag5r/DVOC313rBsYR9pxL9PCGbGodGHPKzFwP/BbOSPa6rPn1mSHft4iKDvVvTRmn+toOStufpRF995vJlOy9/z3ujFWK1QcO3XtC/bRwR8czBVfdxNH3ARUVCJhIXsnwapyDLb+LrOuZTQyQtfLayeLmEDaK6GS1Re93hf8wmxVIl+JbZ/jazdkiNyy+r8U2ExhD70cFglcp6W5CjMvnr+reZWALpTO2wbO1ZbYjpFRPeF7cnr/EA31dmhEjI1K/jpqQFbaJ0yZSxSCd/7G7jMrGPuBRw9qB2GqMpSGyeYA/ViGDKFCWDAf3slzI1N8jSPSJuvO7DNv4f8qVKLHhMF76DSdtt6kxdNr5ZFTSkPAJgysPd8NTE3P49N8+19JCxe1i7U2HZpop3gwnHpFm8vxR8tlIXqefjOU2ULATwbwoBwt7SC5guj2LJnDKdyHgmNejiRcBn78TSzymN8C+gfAw7VOZG+NbkI0FM4DNTVPTWBhZDIi7rdIkDbhCY1/aIFkAUHK05fpgjQNAV/EYBTAmaHrv61r3ov6fBOsfTZ9xBM2MM0flyOcBb56k10H7b4uUTjHy1+g14hFB9Gb1FQIXbW/Ase/p9VrnezNhQzBTt6rc/3+xpI42w/tciQkFG+04tiDeuUQ6fF0vIJyYREOAWhLSqJqDfi7oeCf3gk/BeXunHkB4W8pxHN0ZzoZhv9hOGf7iVBwySN1hy8dsvqahX9vzoNBbwHNOXcNRQseZf+ilHfOfoP14COL/5cYHKeI/3gRk2Hos6FpRQSVVQM YBBWvLxk nTqVtXhUNm/OwJKjpi+YZ1aFK1neisWHZy32AYH7umi7smMD5oq0BzvUG4EotoWK8d5F+yzQQ6+1TB996XxLQ5yXRJBIh8f813mgk0HRxvLw+0+6I/AI848xCtg+UPPwKva170kG4fLlPrhic61wS99Bs75r4HOk6y6nJooouWrkI+jSWfhs2qvGXamr0t9e73H8zc93uUujOV7D+JzpQT+GSUqE+nWzcYBH3mPI3CDgotaShllvSf0DMNBcSd4b9fOTLF1iDDovexlDc5xD5wrxXO5TtVq/9gc3YQXxf26xvuzS7AC9ZqwZNzE5C3hB7zZfoSDBwbl62dF9A1eTlLx8xYo3kR9XmO6OJkFfNwHz307iFVZO+Rphor/eAqAVQe8AokqZEvTRxBE2tjSzU0yBAO0EGfpC3gdngMCkEVNt07sc95YZsm5VjiRGqX2jrk4kh3w36GGzN/+g= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi Guillaume, kernel test robot noticed the following build errors: [auto build test ERROR on akpm-mm/mm-everything] [also build test ERROR on linus/master v6.13-rc1 next-20241204] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Guillaume-Morin/hugetlb-support-FOLL_FORCE-FOLL_WRITE/20241205-022843 base: https://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm.git mm-everything patch link: https://lore.kernel.org/r/Z1Ce6j5WiBE3kaGf%40bender.morinfr.org patch subject: [PATCH v1] hugetlb: support FOLL_FORCE|FOLL_WRITE config: i386-buildonly-randconfig-004 (https://download.01.org/0day-ci/archive/20241205/202412050840.umPPa7cK-lkp@intel.com/config) compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20241205/202412050840.umPPa7cK-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202412050840.umPPa7cK-lkp@intel.com/ All errors (new ones prefixed by >>): mm/gup.c: In function 'can_follow_write_pud': >> mm/gup.c:665:48: error: implicit declaration of function 'pud_soft_dirty'; did you mean 'pmd_soft_dirty'? [-Werror=implicit-function-declaration] 665 | return !vma_soft_dirty_enabled(vma) || pud_soft_dirty(pud); | ^~~~~~~~~~~~~~ | pmd_soft_dirty cc1: some warnings being treated as errors vim +665 mm/gup.c 650 651 #ifdef CONFIG_PGTABLE_HAS_HUGE_LEAVES 652 /* FOLL_FORCE can write to even unwritable PUDs in COW mappings. */ 653 static inline bool can_follow_write_pud(pud_t pud, struct page *page, 654 struct vm_area_struct *vma, 655 unsigned int flags) 656 { 657 /* If the pud is writable, we can write to the page. */ 658 if (pud_write(pud)) 659 return true; 660 661 if (!can_follow_write_common(page, vma, flags)) 662 return false; 663 664 /* ... and a write-fault isn't required for other reasons. */ > 665 return !vma_soft_dirty_enabled(vma) || pud_soft_dirty(pud); 666 } 667 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki