From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 54371C02182 for ; Fri, 24 Jan 2025 02:12:36 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B854628002C; Thu, 23 Jan 2025 21:12:35 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id B35BA28002A; Thu, 23 Jan 2025 21:12:35 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 9D5A928002C; Thu, 23 Jan 2025 21:12:35 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id 7D9AF28002A for ; Thu, 23 Jan 2025 21:12:35 -0500 (EST) Received: from smtpin02.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id 27E691A0B26 for ; Fri, 24 Jan 2025 02:12:35 +0000 (UTC) X-FDA: 83040721470.02.97BB5AC Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.9]) by imf30.hostedemail.com (Postfix) with ESMTP id BF7F78000E for ; Fri, 24 Jan 2025 02:12:32 +0000 (UTC) Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=UDx6WXdp; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf30.hostedemail.com: domain of lkp@intel.com designates 192.198.163.9 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1737684753; a=rsa-sha256; cv=none; b=BFkLNkiU+U7TfTZu8BTU6ZxpdGD99Muwi1TlkoZC1rCeXalSWB2dqx4MmuRJlxAUBG//9m aIaEwe7+wry/oirOdQWknOD92SUXr84lkDYLWefLiy4dcJLIJQ1UFb/AdeCgoh3dQrRep4 ZMUKW+0cc+yuqEg9E/H1W/rsaqKnytA= ARC-Authentication-Results: i=1; imf30.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=UDx6WXdp; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf30.hostedemail.com: domain of lkp@intel.com designates 192.198.163.9 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1737684753; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=UPmM6acKSzQDeXlufKGeLR25eMLELY0p+Hjcp4bjlBk=; b=chyk/bv3raeIm+oLtCLf9BUd12aP+VtqAXOW70uyFEcSLlICLkJJa5KI/jsmttuZ0ut7PR KguT8xrYnGvNcHlH3NgTqdzpFxEqO4jz6Qf1BVtjY2otTxTf7BWl6m5VbI5FRhQyN2+11v qCgCsicMHTDLSJTNmbqOJeedR4HWQ5A= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1737684753; x=1769220753; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=ZVWsL5TzIlssbUAp6wHsmMyTAmfxKSHrFnKGbtmAIBQ=; b=UDx6WXdpzQxtG3p68uz6Ysf5EAgumgddq9AWLrpTatEj3EdDpeclVfKO eSe5skJxMD5CX3ix9lEpvtscCCyz060yMpu6CYyPMxErfkPqb7qlvSIxx 8DM4v/fpARye/+ibiinHuR94KiQRDtZ262QKeAH1nPUOD9Y0ldU0wNO5o we5zMm/8FmVN1UFkUPrqHIMnr1JAkphCERjKplatqgB1Gj6vH82e5sm73 ZusPTfzEoFikwD2JWK0jUmiqV24sooq0ylC1/XCXGYP9ora6WJHlHjbWV jfQmTr171LZ90Ldofn3uVRrXbWy+JzulGPVv5nj+OkbiFIXRqDuaFdEBt Q==; X-CSE-ConnectionGUID: H3yxUcqeSrmRkmkNiy/QjQ== X-CSE-MsgGUID: /6tUh6lRToy0dDc7lYIqGQ== X-IronPort-AV: E=McAfee;i="6700,10204,11324"; a="48875996" X-IronPort-AV: E=Sophos;i="6.13,230,1732608000"; d="scan'208";a="48875996" Received: from orviesa006.jf.intel.com ([10.64.159.146]) by fmvoesa103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Jan 2025 18:12:31 -0800 X-CSE-ConnectionGUID: nXYMOnQESfGam5t5ZaclGw== X-CSE-MsgGUID: 6JPi4DtnRJujUu4v4yIVnA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.13,230,1732608000"; d="scan'208";a="107645960" Received: from lkp-server01.sh.intel.com (HELO d63d4d77d921) ([10.239.97.150]) by orviesa006.jf.intel.com with ESMTP; 23 Jan 2025 18:12:27 -0800 Received: from kbuild by d63d4d77d921 with local (Exim 4.96) (envelope-from ) id 1tb9BI-000c19-0j; Fri, 24 Jan 2025 02:12:24 +0000 Date: Fri, 24 Jan 2025 10:11:52 +0800 From: kernel test robot To: "Jiao, Joey" , Dmitry Vyukov , Andrey Konovalov , Jonathan Corbet , Andrew Morton , Dennis Zhou , Tejun Heo , Christoph Lameter , Catalin Marinas , Will Deacon Cc: oe-kbuild-all@lists.linux.dev, Linux Memory Management List , kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, workflows@vger.kernel.org, linux-doc@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kernel@quicinc.com Subject: Re: [PATCH 4/7] kcov: introduce new kcov KCOV_TRACE_UNIQ_CMP mode Message-ID: <202501240959.61XLxBYF-lkp@intel.com> References: <20250114-kcov-v1-4-004294b931a2@quicinc.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20250114-kcov-v1-4-004294b931a2@quicinc.com> X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: BF7F78000E X-Stat-Signature: n93x3juuj3hm7ewqwf68xim8apwrbkxq X-Rspam-User: X-HE-Tag: 1737684752-354808 X-HE-Meta: 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 FSf+H2x5 8H50fdRcmpbO9sU9P1yarkhLo96ag3IPj9lfQS2i0BPYMmD2M0CQ5qpXrwi4rc8xKPoUClbkSxOYzo2vNtLyWfnDvPQjSmfvLWHYKLqI7HmtTGZu0qqR9VCdNFW9J42QBBs+qPT3StfmDeTIlq2DwRD7v5yPt5pGz7jd5KBqCvXINee0EZEc04ZnhZeyVY7qdYrqWlAYg82knsZu+NmGcotvBKdm7PwVib+nnxFHQjBIRshpHnr23jVcnMZF3PDSgahPQeK6djxxMBLA8IX1Jd6yDu8Axf/O/eQhi/rHv9ANsbhAu6tDxYhtZxnLmavC7CllGupEFXblu9QYZBDwHOJskEW/YQuD3gnBUbfIHMc2ytv3a9Qgn5brHqZfSmbV6l9+2gY12EjRRjq+VHDrIuegAA7B89qUznOxvnCBM1dNFlfw7Sq8Rirh3fA== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi Joey, kernel test robot noticed the following build errors: [auto build test ERROR on 9b2ffa6148b1e4468d08f7e0e7e371c43cac9ffe] url: https://github.com/intel-lab-lkp/linux/commits/Jiao-Joey/kcov-introduce-new-kcov-KCOV_TRACE_UNIQ_PC-mode/20250114-133713 base: 9b2ffa6148b1e4468d08f7e0e7e371c43cac9ffe patch link: https://lore.kernel.org/r/20250114-kcov-v1-4-004294b931a2%40quicinc.com patch subject: [PATCH 4/7] kcov: introduce new kcov KCOV_TRACE_UNIQ_CMP mode config: mips-randconfig-r073-20250124 (https://download.01.org/0day-ci/archive/20250124/202501240959.61XLxBYF-lkp@intel.com/config) compiler: mips-linux-gcc (GCC) 14.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250124/202501240959.61XLxBYF-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202501240959.61XLxBYF-lkp@intel.com/ All errors (new ones prefixed by >>): kernel/kcov.c: In function 'kcov_map_add': >> kernel/kcov.c:309:60: error: 'struct kcov_entry' has no member named 'type' 309 | if (entry->ent == ent->ent && entry->type == ent->type && | ^~ kernel/kcov.c:309:73: error: 'struct kcov_entry' has no member named 'type' 309 | if (entry->ent == ent->ent && entry->type == ent->type && | ^~ >> kernel/kcov.c:310:34: error: 'struct kcov_entry' has no member named 'arg1' 310 | entry->arg1 == ent->arg1 && entry->arg2 == ent->arg2) { | ^~ kernel/kcov.c:310:47: error: 'struct kcov_entry' has no member named 'arg1' 310 | entry->arg1 == ent->arg1 && entry->arg2 == ent->arg2) { | ^~ >> kernel/kcov.c:310:62: error: 'struct kcov_entry' has no member named 'arg2' 310 | entry->arg1 == ent->arg1 && entry->arg2 == ent->arg2) { | ^~ kernel/kcov.c:310:75: error: 'struct kcov_entry' has no member named 'arg2' 310 | entry->arg1 == ent->arg1 && entry->arg2 == ent->arg2) { | ^~ kernel/kcov.c:343:48: error: 'struct kcov_entry' has no member named 'type' 343 | area[start_index] = ent->type; | ^~ kernel/kcov.c:344:52: error: 'struct kcov_entry' has no member named 'arg1' 344 | area[start_index + 1] = ent->arg1; | ^~ kernel/kcov.c:345:52: error: 'struct kcov_entry' has no member named 'arg2' 345 | area[start_index + 2] = ent->arg2; | ^~ vim +309 kernel/kcov.c 290 291 static notrace inline void kcov_map_add(struct kcov_map *map, struct kcov_entry *ent, 292 struct task_struct *t, unsigned int mode) 293 { 294 struct kcov *kcov; 295 struct kcov_entry *entry; 296 unsigned int key = hash_key(ent); 297 unsigned long pos, start_index, end_pos, max_pos, *area; 298 299 kcov = t->kcov; 300 301 if ((mode == KCOV_MODE_TRACE_UNIQ_PC || 302 mode == KCOV_MODE_TRACE_UNIQ_EDGE)) 303 hash_for_each_possible_rcu(map->buckets, entry, node, key) { 304 if (entry->ent == ent->ent) 305 return; 306 } 307 else 308 hash_for_each_possible_rcu(map->buckets, entry, node, key) { > 309 if (entry->ent == ent->ent && entry->type == ent->type && > 310 entry->arg1 == ent->arg1 && entry->arg2 == ent->arg2) { 311 return; 312 } 313 } 314 315 entry = (struct kcov_entry *)gen_pool_alloc(map->pool, 1 << MIN_POOL_ALLOC_ORDER); 316 if (unlikely(!entry)) 317 return; 318 319 barrier(); 320 memcpy(entry, ent, sizeof(*entry)); 321 hash_add_rcu(map->buckets, &entry->node, key); 322 323 if (mode == KCOV_MODE_TRACE_UNIQ_PC || mode == KCOV_MODE_TRACE_UNIQ_CMP) 324 area = t->kcov_area; 325 else 326 area = kcov->map_edge->area; 327 328 pos = READ_ONCE(area[0]) + 1; 329 if (mode == KCOV_MODE_TRACE_UNIQ_PC || mode == KCOV_MODE_TRACE_UNIQ_EDGE) { 330 if (likely(pos < t->kcov_size)) { 331 WRITE_ONCE(area[0], pos); 332 barrier(); 333 area[pos] = ent->ent; 334 } 335 } else { 336 start_index = 1 + (pos - 1) * KCOV_WORDS_PER_CMP; 337 max_pos = t->kcov_size * sizeof(unsigned long); 338 end_pos = (start_index + KCOV_WORDS_PER_CMP) * sizeof(u64); 339 if (likely(end_pos <= max_pos)) { 340 /* See comment in __sanitizer_cov_trace_pc(). */ 341 WRITE_ONCE(area[0], pos); 342 barrier(); 343 area[start_index] = ent->type; 344 area[start_index + 1] = ent->arg1; 345 area[start_index + 2] = ent->arg2; 346 area[start_index + 3] = ent->ent; 347 } 348 } 349 } 350 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki