From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.9 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id AE158C47096 for ; Thu, 3 Jun 2021 08:44:57 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 4021A6136E for ; Thu, 3 Jun 2021 08:44:57 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 4021A6136E Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=intel.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id D13086B006C; Thu, 3 Jun 2021 04:44:56 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id CC2FA6B006E; Thu, 3 Jun 2021 04:44:56 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B63FB6B0070; Thu, 3 Jun 2021 04:44:56 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0225.hostedemail.com [216.40.44.225]) by kanga.kvack.org (Postfix) with ESMTP id 7D8F56B006C for ; Thu, 3 Jun 2021 04:44:56 -0400 (EDT) Received: from smtpin04.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay05.hostedemail.com (Postfix) with ESMTP id 0B087181AC9C6 for ; Thu, 3 Jun 2021 08:44:56 +0000 (UTC) X-FDA: 78211777392.04.D5473BC Received: from mga05.intel.com (mga05.intel.com [192.55.52.43]) by imf21.hostedemail.com (Postfix) with ESMTP id 54C03E000253 for ; Thu, 3 Jun 2021 08:44:35 +0000 (UTC) IronPort-SDR: lvEU8t+10y+C8wpk4IGQdrU725bTKOysnV3jckSh3Z+d1r6hSkHAMXbFSlQm32dmM093SdmjH/ WUmeZ31e/b6Q== X-IronPort-AV: E=McAfee;i="6200,9189,10003"; a="289628849" X-IronPort-AV: E=Sophos;i="5.83,244,1616482800"; d="scan'208";a="289628849" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Jun 2021 01:44:46 -0700 IronPort-SDR: NGlCSV5W7mMD7DlnfOzvOFuCWlMLMuAfucUj+5jGK5uyCN/ObvrKOJQOSYQpfs7kDrSN2b5abj 9PlnOwOxeVnw== X-IronPort-AV: E=Sophos;i="5.83,244,1616482800"; d="scan'208";a="480143708" Received: from shao2-debian.sh.intel.com (HELO [10.239.13.11]) ([10.239.13.11]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Jun 2021 01:44:42 -0700 Subject: Re: [kbuild-all] Re: [linux-next:master 5756/5946] mm/userfaultfd.c:212:6: warning: variable 'vm_alloc_shared' set but not used To: Souptick Joarder , kernel test robot Cc: Mina Almasry , kbuild-all@lists.01.org, Linux Memory Management List , Andrew Morton References: <202106012056.ufRLDFck-lkp@intel.com> From: Rong Chen Message-ID: Date: Thu, 3 Jun 2021 16:44:27 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Authentication-Results: imf21.hostedemail.com; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=intel.com (policy=none); spf=none (imf21.hostedemail.com: domain of rong.a.chen@intel.com has no SPF policy when checking 192.55.52.43) smtp.mailfrom=rong.a.chen@intel.com X-Rspamd-Server: rspam01 X-Rspamd-Queue-Id: 54C03E000253 X-Stat-Signature: hn1zwftouyoext7padp4iscbqwf71ups X-HE-Tag: 1622709875-512974 Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On 6/2/21 4:18 PM, Souptick Joarder wrote: > On Tue, Jun 1, 2021 at 5:40 PM kernel test robot wrote: >> tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-nex= t.git master >> head: 392d24c0d06bc89a762ba66977db41e53c21bfb5 >> commit: 1786d001262006df52cdcda4cbc0c8087a0200ec [5756/5946] mm, huget= lb: fix racy resv_huge_pages underflow on UFFDIO_COPY >> config: powerpc64-randconfig-r022-20210601 (attached as .config) >> compiler: powerpc-linux-gcc (GCC) 9.3.0 >> reproduce (this is a W=3D1 build): >> wget https://raw.githubusercontent.com/intel/lkp-tests/master= /sbin/make.cross -O ~/bin/make.cross >> chmod +x ~/bin/make.cross >> # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-= next.git/commit/?id=3D1786d001262006df52cdcda4cbc0c8087a0200ec >> git remote add linux-next https://git.kernel.org/pub/scm/linu= x/kernel/git/next/linux-next.git >> git fetch --no-tags linux-next master >> git checkout 1786d001262006df52cdcda4cbc0c8087a0200ec >> # save the attached .config to linux build tree >> COMPILER_INSTALL_PATH=3D$HOME/0day COMPILER=3Dgcc-9.3.0 make.= cross ARCH=3Dpowerpc64 >> >> If you fix the issue, kindly add following tag as appropriate >> Reported-by: kernel test robot >> >> All warnings (new ones prefixed by >>): >> >> mm/userfaultfd.c: In function '__mcopy_atomic_hugetlb': >>>> mm/userfaultfd.c:212:6: warning: variable 'vm_alloc_shared' set but = not used [-Wunused-but-set-variable] >> 212 | int vm_alloc_shared =3D dst_vma->vm_flags & VM_SHARED; >> | ^~~~~~~~~~~~~~~ >> > Looks like a false warning. vm_alloc_shared is set here within the > same function. Hi Souptick, The warning is the same as you said,=C2=A0 vm_alloc_shared is only set bu= t=20 not used. Best Regards, Rong Chen > > mutex_unlock(&hugetlb_fault_mutex_table[hash]); > i_mmap_unlock_read(mapping); > vm_alloc_shared =3D vm_shared; > >> vim +/vm_alloc_shared +212 mm/userfaultfd.c >> >> c1a4de99fada21 Andrea Arcangeli 2015-09-04 199 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 200 #ifdef CONFIG_HUGETL= B_PAGE >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 201 /* >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 202 * __mcopy_atomic pr= ocessing for HUGETLB vmas. Note that this routine is >> c1e8d7c6a7a682 Michel Lespinasse 2020-06-08 203 * called with mmap_= lock held, it will release mmap_lock before returning. >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 204 */ >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 205 static __always_inli= ne ssize_t __mcopy_atomic_hugetlb(struct mm_struct *dst_mm, >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 206 = struct vm_area_struct *dst_vma, >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 207 = unsigned long dst_start, >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 208 = unsigned long src_start, >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 209 = unsigned long len, >> f619147104c8ea Axel Rasmussen 2021-05-04 210 = enum mcopy_atomic_mode mode) >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 211 { >> 1c9e8def43a345 Mike Kravetz 2017-02-22 @212 int vm_alloc_s= hared =3D dst_vma->vm_flags & VM_SHARED; >> 1c9e8def43a345 Mike Kravetz 2017-02-22 213 int vm_shared = =3D dst_vma->vm_flags & VM_SHARED; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 214 ssize_t err; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 215 pte_t *dst_pte= ; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 216 unsigned long = src_addr, dst_addr; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 217 long copied; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 218 struct page *p= age; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 219 unsigned long = vma_hpagesize; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 220 pgoff_t idx; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 221 u32 hash; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 222 struct address= _space *mapping; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 223 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 224 /* >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 225 * There is no= default zero huge page for all huge page sizes as >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 226 * supported b= y hugetlb. A PMD_SIZE huge pages may exist as used >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 227 * by THP. Si= nce we can not reliably insert a zero page, this >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 228 * feature is = not supported. >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 229 */ >> f619147104c8ea Axel Rasmussen 2021-05-04 230 if (mode =3D=3D= MCOPY_ATOMIC_ZEROPAGE) { >> d8ed45c5dcd455 Michel Lespinasse 2020-06-08 231 mmap_r= ead_unlock(dst_mm); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 232 return= -EINVAL; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 233 } >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 234 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 235 src_addr =3D s= rc_start; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 236 dst_addr =3D d= st_start; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 237 copied =3D 0; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 238 page =3D NULL; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 239 vma_hpagesize = =3D vma_kernel_pagesize(dst_vma); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 240 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 241 /* >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 242 * Validate al= ignment based on huge page size >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 243 */ >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 244 err =3D -EINVA= L; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 245 if (dst_start = & (vma_hpagesize - 1) || len & (vma_hpagesize - 1)) >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 246 goto o= ut_unlock; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 247 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 248 retry: >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 249 /* >> c1e8d7c6a7a682 Michel Lespinasse 2020-06-08 250 * On routine = entry dst_vma is set. If we had to drop mmap_lock and >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 251 * retry, dst_= vma will be set to NULL and we must lookup again. >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 252 */ >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 253 if (!dst_vma) = { >> 27d02568f529e9 Mike Rapoport 2017-02-24 254 err =3D= -ENOENT; >> 643aa36eadebdc Wei Yang 2019-11-30 255 dst_vm= a =3D find_dst_vma(dst_mm, dst_start, len); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 256 if (!d= st_vma || !is_vm_hugetlb_page(dst_vma)) >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 257 = goto out_unlock; >> 1c9e8def43a345 Mike Kravetz 2017-02-22 258 >> 27d02568f529e9 Mike Rapoport 2017-02-24 259 err =3D= -EINVAL; >> 27d02568f529e9 Mike Rapoport 2017-02-24 260 if (vm= a_hpagesize !=3D vma_kernel_pagesize(dst_vma)) >> 27d02568f529e9 Mike Rapoport 2017-02-24 261 = goto out_unlock; >> 27d02568f529e9 Mike Rapoport 2017-02-24 262 >> 1c9e8def43a345 Mike Kravetz 2017-02-22 263 vm_sha= red =3D dst_vma->vm_flags & VM_SHARED; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 264 } >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 265 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 266 /* >> 1c9e8def43a345 Mike Kravetz 2017-02-22 267 * If not shar= ed, ensure the dst_vma has a anon_vma. >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 268 */ >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 269 err =3D -ENOME= M; >> 1c9e8def43a345 Mike Kravetz 2017-02-22 270 if (!vm_shared= ) { >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 271 if (un= likely(anon_vma_prepare(dst_vma))) >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 272 = goto out_unlock; >> 1c9e8def43a345 Mike Kravetz 2017-02-22 273 } >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 274 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 275 while (src_add= r < src_start + len) { >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 276 BUG_ON= (dst_addr >=3D dst_start + len); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 277 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 278 /* >> c0d0381ade7988 Mike Kravetz 2020-04-01 279 * Ser= ialize via i_mmap_rwsem and hugetlb_fault_mutex. >> c0d0381ade7988 Mike Kravetz 2020-04-01 280 * i_m= map_rwsem ensures the dst_pte remains valid even >> c0d0381ade7988 Mike Kravetz 2020-04-01 281 * in = the case of shared pmds. fault mutex prevents >> c0d0381ade7988 Mike Kravetz 2020-04-01 282 * rac= es with other faulting threads. >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 283 */ >> ddeaab32a89f04 Mike Kravetz 2019-01-08 284 mappin= g =3D dst_vma->vm_file->f_mapping; >> c0d0381ade7988 Mike Kravetz 2020-04-01 285 i_mmap= _lock_read(mapping); >> c0d0381ade7988 Mike Kravetz 2020-04-01 286 idx =3D= linear_page_index(dst_vma, dst_addr); >> 188b04a7d93860 Wei Yang 2019-11-30 287 hash =3D= hugetlb_fault_mutex_hash(mapping, idx); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 288 mutex_= lock(&hugetlb_fault_mutex_table[hash]); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 289 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 290 err =3D= -ENOMEM; >> aec44e0f0213e3 Peter Xu 2021-05-04 291 dst_pt= e =3D huge_pte_alloc(dst_mm, dst_vma, dst_addr, vma_hpagesize); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 292 if (!d= st_pte) { >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 293 = mutex_unlock(&hugetlb_fault_mutex_table[hash]); >> c0d0381ade7988 Mike Kravetz 2020-04-01 294 = i_mmap_unlock_read(mapping); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 295 = goto out_unlock; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 296 } >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 297 >> f619147104c8ea Axel Rasmussen 2021-05-04 298 if (mo= de !=3D MCOPY_ATOMIC_CONTINUE && >> f619147104c8ea Axel Rasmussen 2021-05-04 299 !h= uge_pte_none(huge_ptep_get(dst_pte))) { >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 300 = err =3D -EEXIST; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 301 = mutex_unlock(&hugetlb_fault_mutex_table[hash]); >> c0d0381ade7988 Mike Kravetz 2020-04-01 302 = i_mmap_unlock_read(mapping); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 303 = goto out_unlock; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 304 } >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 305 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 306 err =3D= hugetlb_mcopy_atomic_pte(dst_mm, dst_pte, dst_vma, >> f619147104c8ea Axel Rasmussen 2021-05-04 307 = dst_addr, src_addr, mode, &page); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 308 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 309 mutex_= unlock(&hugetlb_fault_mutex_table[hash]); >> c0d0381ade7988 Mike Kravetz 2020-04-01 310 i_mmap= _unlock_read(mapping); >> 1c9e8def43a345 Mike Kravetz 2017-02-22 311 vm_all= oc_shared =3D vm_shared; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 312 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 313 cond_r= esched(); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 314 >> 9e368259ad9883 Andrea Arcangeli 2018-11-30 315 if (un= likely(err =3D=3D -ENOENT)) { >> d8ed45c5dcd455 Michel Lespinasse 2020-06-08 316 = mmap_read_unlock(dst_mm); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 317 = BUG_ON(!page); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 318 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 319 = err =3D copy_huge_page_from_user(page, >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 320 = (const void __user *)src_addr, >> 4fb07ee6510280 Wei Yang 2019-11-30 321 = vma_hpagesize / PAGE_SIZE, >> 4fb07ee6510280 Wei Yang 2019-11-30 322 = true); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 323 = if (unlikely(err)) { >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 324 = err =3D -EFAULT; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 325 = goto out; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 326 = } >> d8ed45c5dcd455 Michel Lespinasse 2020-06-08 327 = mmap_read_lock(dst_mm); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 328 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 329 = dst_vma =3D NULL; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 330 = goto retry; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 331 } else >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 332 = BUG_ON(page); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 333 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 334 if (!e= rr) { >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 335 = dst_addr +=3D vma_hpagesize; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 336 = src_addr +=3D vma_hpagesize; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 337 = copied +=3D vma_hpagesize; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 338 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 339 = if (fatal_signal_pending(current)) >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 340 = err =3D -EINTR; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 341 } >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 342 if (er= r) >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 343 = break; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 344 } >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 345 >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 346 out_unlock: >> d8ed45c5dcd455 Michel Lespinasse 2020-06-08 347 mmap_read_unlo= ck(dst_mm); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 348 out: >> 1786d001262006 Mina Almasry 2021-06-01 349 if (page) >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 350 put_pa= ge(page); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 351 BUG_ON(copied = < 0); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 352 BUG_ON(err > 0= ); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 353 BUG_ON(!copied= && !err); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 354 return copied = ? copied : err; >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 355 } >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 356 #else /* !CONFIG_HUG= ETLB_PAGE */ >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 357 /* fail at build tim= e if gcc attempts to use this */ >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 358 extern ssize_t __mco= py_atomic_hugetlb(struct mm_struct *dst_mm, >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 359 = struct vm_area_struct *dst_vma, >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 360 = unsigned long dst_start, >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 361 = unsigned long src_start, >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 362 = unsigned long len, >> f619147104c8ea Axel Rasmussen 2021-05-04 363 = enum mcopy_atomic_mode mode); >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 364 #endif /* CONFIG_HUG= ETLB_PAGE */ >> 60d4d2d2b40e44 Mike Kravetz 2017-02-22 365 >> >> :::::: The code at line 212 was first introduced by commit >> :::::: 1c9e8def43a3452e7af658b340f5f4f4ecde5c38 userfaultfd: hugetlbfs= : add UFFDIO_COPY support for shared mappings >> >> :::::: TO: Mike Kravetz >> :::::: CC: Linus Torvalds >> >> --- >> 0-DAY CI Kernel Test Service, Intel Corporation >> https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org > _______________________________________________ > kbuild-all mailing list -- kbuild-all@lists.01.org > To unsubscribe send an email to kbuild-all-leave@lists.01.org