From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6FF00C83F22 for ; Sun, 20 Jul 2025 07:45:38 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B187F6B007B; Sun, 20 Jul 2025 03:45:37 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id AC9AC6B0098; Sun, 20 Jul 2025 03:45:37 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 9DF8B6B0099; Sun, 20 Jul 2025 03:45:37 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 900906B007B for ; Sun, 20 Jul 2025 03:45:37 -0400 (EDT) Received: from smtpin04.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 10768C0460 for ; Sun, 20 Jul 2025 07:45:37 +0000 (UTC) X-FDA: 83683858314.04.0F6B9FF Received: from mail-lj1-f179.google.com (mail-lj1-f179.google.com [209.85.208.179]) by imf22.hostedemail.com (Postfix) with ESMTP id 4469EC0006 for ; Sun, 20 Jul 2025 07:45:34 +0000 (UTC) Authentication-Results: imf22.hostedemail.com; dkim=pass header.d=gmail.com header.s=20230601 header.b=npGtBkOB; spf=pass (imf22.hostedemail.com: domain of snovitoll@gmail.com designates 209.85.208.179 as permitted sender) smtp.mailfrom=snovitoll@gmail.com; dmarc=pass (policy=none) header.from=gmail.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1752997535; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=e6GCnhyZ97Fa9wrvzw+stGLcgjyoNyAO5PSjQNCTGfc=; b=TRgUhRGzrN/g7YYr8S8ENFIpZ3n9KCOFra0C4/3gg99KIRl+BkzhKDdl//6s6NlOKLGYPa bQTHvDD6kYvz9bzsrwbiS8dsZAnRgYeCbE6F9H64EIxwBtyii57yCstXSNvdp5sg6lvD9i uUqaPpqZvkTmZp0wxTghs+1Pyzp+F34= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1752997535; a=rsa-sha256; cv=none; b=bvR66jocgSjoO1gSCjP2GFIPgPlAryaIqRL/hs6sRCu2aRcWyBhQIYric1Yl9yD6h6yMSE FPg4c0ctHZQZZNLyYBv/idrLwqL7mLr/FVzDXuRGx6ck5flwEonh884SvfIbQsnAcfN6M8 0nl4M3kazy3w2k5NZqKj+9eCFwADV7Q= ARC-Authentication-Results: i=1; imf22.hostedemail.com; dkim=pass header.d=gmail.com header.s=20230601 header.b=npGtBkOB; spf=pass (imf22.hostedemail.com: domain of snovitoll@gmail.com designates 209.85.208.179 as permitted sender) smtp.mailfrom=snovitoll@gmail.com; dmarc=pass (policy=none) header.from=gmail.com Received: by mail-lj1-f179.google.com with SMTP id 38308e7fff4ca-32b7cf56cacso31416531fa.1 for ; Sun, 20 Jul 2025 00:45:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1752997533; x=1753602333; darn=kvack.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=e6GCnhyZ97Fa9wrvzw+stGLcgjyoNyAO5PSjQNCTGfc=; b=npGtBkOBxZTiDY4FafFBXCl62zm3EPLXsZVv1dF/XDt3ybQE/BVRPxb5uM/MveITJl wW5q+cNZI50DnVvQ5OUEiytVd9ThEsUyhFiNBxnhFMrN5A7GwnL59z4uCsu24MDPW3Eb 9IhEAp6ngSGHzGvvCoD9coDdicFwSvVo3glwpMEP56cHHXIdE3bZnVKetGVl31gtFSzd z0Wnj3k+2Njb4dQISjDLGGDr/9+vd8x2nHSVj/KOD0j86vBKmDky3nroTwQno9/8Cgrn 1ZOYtZB0mREKUKja1hpMHwUzu8f7Io8z8d4KLMwzdWu9qj9VQY02lQlxk/6qRXzRoh/d zraQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1752997533; x=1753602333; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=e6GCnhyZ97Fa9wrvzw+stGLcgjyoNyAO5PSjQNCTGfc=; b=Y2gcX2D91h5GYkaOhJbSJtmi5QCdrfOk1+s8VjJo8VPbqBxhPmGN/PLKjhelbSdJWH oCUKWznlG/ChMVeXjoescgZh7DZhQhXg12+UPyO+ZamSktfKsi2uldFsAMipuMpBioSc OZUG/JFxUfxiHfBhvvyzKHa49L0s/RAvQiN49gG5OCo5T1eLDNVsh6l0pGi1Jn7ADWTH ChLkiCZYNaFYT87gUs346BXTBJj22IuorZKB+IYfZDUAMrBY15hqvx4u/woiRV7GUH3B HuIHJguIwUeCV/azJq+TyGc7AzJj7y0kEEzrDUCdwu6HoFL33Fly5QEEQa4CskE0XRmd tCZQ== X-Forwarded-Encrypted: i=1; AJvYcCXBNg02Iioz+JnrsWTjV5HMENGpqiwozuGhUTD3g2TupFsXjPHyvjzcDwbppJIbZtkDuGfd1/xMzw==@kvack.org X-Gm-Message-State: AOJu0YzS2CvCU0Nt/UPzu0gat1QG96BQmHBZt2BteX1N5LujuL6liZyl cC/+jTsF42ci/eJXBNROnGOMFOc6YXlxDXcbWQumuTi77DqcowmT0g8VoXsFIsY/m0rPxJNS5Fl tZwyP60dvPXRU+9wA/6cAtttJWAuOGc3OE4kxmIs= X-Gm-Gg: ASbGncvMuDNayvhDpAgbpOOeDBHVk19MbFpKhzCM/ik0R7FIrfneLnlP5FadzkAtJUY MS6wTUQoc8Rt785ary8/maBFkf9OPLeR2EkhXs/OMJV1XRZQav/B5z8PNeBO1Y2dUO6fx0A5E4r 8sZEuJUUq6PqEXLepGQwg58rhYfCY6RcAoN2/qif+SQSM3Olq2Rf+XXIMekA3gM2rAEK4M8G39Y 5WeTp8= X-Google-Smtp-Source: AGHT+IHGpnFCjDTiG1geEjmCO6Bjhm3v/M3utulV0Br5gTrnexquUxAH087cT1ubTstp8fSrj3yHoRhbWJImvj9FtEs= X-Received: by 2002:a05:651c:400c:b0:32b:3b5a:c4a2 with SMTP id 38308e7fff4ca-3308e352419mr34008621fa.6.1752997532888; Sun, 20 Jul 2025 00:45:32 -0700 (PDT) MIME-Version: 1.0 References: <202507190528.W6ndwfyg-lkp@intel.com> <20250719170413.9b64b9321c3ac082712348fe@linux-foundation.org> In-Reply-To: <20250719170413.9b64b9321c3ac082712348fe@linux-foundation.org> From: Sabyrzhan Tasbolatov Date: Sun, 20 Jul 2025 12:45:15 +0500 X-Gm-Features: Ac12FXzyXQfBVhPlycXGDETMRSLjWoBYDV54ORm062NblE_kRUmN5joT8HHTgUg Message-ID: Subject: Re: [akpm-mm:mm-new 160/175] mm/kasan/tags.c:145:6: error: redefinition of 'kasan_save_free_info' To: Andrew Morton Cc: kernel test robot , llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, Linux Memory Management List Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Rspamd-Server: rspam03 X-Rspamd-Queue-Id: 4469EC0006 X-Stat-Signature: c5k86ney3rxrm9fm85wwjnwkdkygjbnz X-Rspam-User: X-HE-Tag: 1752997534-961677 X-HE-Meta: U2FsdGVkX1+PzmKwt4wJtekqrewXs5twg1Wtzn7bI8rFaIp6MTf6DjOyRWJ+gK/iIUFAb/yBb13XF3/GNgX3EbF29wki2hBkY8V1A6xZaJztGY1bzvhT2i3mb27Ks+K2qlcD9zV44EjsZHInxfV8WDd2jC6jKYbGDQo/GEqCaBQAJYUHpExmTGwjvk7LIHhOHRxjh81s96ydGhocF6EP7M8af+2chnkqRT+oBZ/UVHiZD5eU+3+HA2u46JSy9sLhOCZcsv22Us9fEPP2Ep2sKE/0geWqD3aptyqw9ymIOCf2DMNW7E0tQNGEdnVr/Vd4gaLSBf2mEwbOG9ucE/f5M7+jLFiqS2vNWMtaEHS6JDPDSuA81R7vmrKLP8EPqVIa5waVBvCnaHX6WCuhqgeZS6twm9g6uRum2hY4n6KdBLc85vgVxTbD8Q+aRt0Euxua7IsvpPY4qBTiE6sQYpIIX8GZ0UDK9L7HE0wl6ryh6HKvfM4eQSuFvjazX6y22KMxu71ETnf7mooM6MH11slgXsX+zngGSFn3tOPj2GSN4lgxsIn1dnnETNOAY++tgrMM2wHU968vay6Ie/WqKc+xjRwU6Eu/LQVmPFSxLtDXcMIBYjStRubgugFrvloiWg6HgU79xrBYUmOkz5ZphSRwtGH4iNQ7O8fifwfi80mxO9qfLO1/EWUJCjcPz5CNH8lFksGCU5LHyjGhmWSQiCVtD1bSCEycXg/QKw1HCYc1PpWDaAQYcAlDHAi4cPfBOURBy/Qg95vVaNn+75RbujNXPhjP6MrLKP7cgmaAKhWC8RAeYAxQk0+H1dgsK2070fCIwzXneBuquOPFzqYNoPWXFUFex6XyfUBF8PrV9yQm4DxrKc+/zS04xoT/G2jDxXaTvf4DcUifeakb+qHLgBdkbGDlSjNpU1RDYxDThJGJRJl/ct1nXpx3PMxSEueYQ1rLEIfSczjC651mMT2LJVs l5QmwKSF W20h14pSR9sLn35gQ18rp3tx6xArSUE8Q+SrXIeHFgpZMNDhjqgHJ4qgSW9Y9r1qZjmkcvij+4XbEJVWoVqaelD+UZ6bxlvWsh83U X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On Sun, Jul 20, 2025 at 5:04=E2=80=AFAM Andrew Morton wrote: > > On Sat, 19 Jul 2025 05:28:51 +0800 kernel test robot wrot= e: > > > tree: https://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm.git mm-= new > > head: b0e07b9befa0558a80b281b7efcdb3717881c969 > > commit: 3d3c26eaf9f6e00779d27dd54d763c9bdc5dda3c [160/175] kasan: add s= hadow checks to wrappers and rename kasan_arch_is_ready > > config: arm64-randconfig-001-20250719 (https://download.01.org/0day-ci/= archive/20250719/202507190528.W6ndwfyg-lkp@intel.com/config) > > compiler: clang version 20.1.8 (https://github.com/llvm/llvm-project 87= f0227cb60147a26a1eeb4fb06e3b505e9c7261) > > reproduce (this is a W=3D1 build): (https://download.01.org/0day-ci/arc= hive/20250719/202507190528.W6ndwfyg-lkp@intel.com/reproduce) > > > > If you fix the issue in a separate patch/commit (i.e. not just a new ve= rsion of > > the same patch/commit), kindly add following tags > > | Reported-by: kernel test robot > > | Closes: https://lore.kernel.org/oe-kbuild-all/202507190528.W6ndwfyg-l= kp@intel.com/ > > > > All errors (new ones prefixed by >>): > > > > >> mm/kasan/tags.c:145:6: error: redefinition of 'kasan_save_free_info' > > 145 | void kasan_save_free_info(struct kmem_cache *cache, void *ob= ject) > > | ^ > > mm/kasan/kasan.h:403:20: note: previous definition is here > > 403 | static inline void kasan_save_free_info(struct kmem_cache *c= ache, void *object) > > | ^ > > 1 error generated. > > I'll add this. It should repair the build, at least? Yes, thanks, it should. Sorry, I've missed that. > > --- a/mm/kasan/tags.c~kasan-add-shadow-checks-to-wrappers-and-rename-kasa= n_arch_is_ready-fix > +++ a/mm/kasan/tags.c > @@ -142,7 +142,7 @@ void kasan_save_alloc_info(struct kmem_c > save_stack_info(cache, object, flags, false); > } > > -void kasan_save_free_info(struct kmem_cache *cache, void *object) > +void __kasan_save_free_info(struct kmem_cache *cache, void *object) > { > save_stack_info(cache, object, 0, true); > } > _ >