From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 66AC5C3ABA3 for ; Thu, 1 May 2025 03:23:40 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id E03396B0085; Wed, 30 Apr 2025 23:23:38 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id DB1846B0089; Wed, 30 Apr 2025 23:23:38 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id C55C16B008A; Wed, 30 Apr 2025 23:23:38 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id A323F6B0085 for ; Wed, 30 Apr 2025 23:23:38 -0400 (EDT) Received: from smtpin07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id 3A3A51A1886 for ; Thu, 1 May 2025 03:23:38 +0000 (UTC) X-FDA: 83392894116.07.07D11FE Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.7]) by imf17.hostedemail.com (Postfix) with ESMTP id 7339740007 for ; Thu, 1 May 2025 03:23:35 +0000 (UTC) Authentication-Results: imf17.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=Fc2tq5XS; spf=pass (imf17.hostedemail.com: domain of lkp@intel.com designates 192.198.163.7 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1746069816; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=9MU0Q4CT+onxp0FpdQAIfPSHrJwsMJDLhjSNR7nZYD0=; b=oCEWk5Tw4E2O8pPTECCyEdvz/Eb1bzHu5JeAhoyFLiAyym4KgiDZ/c6cEc32D4YPWldBoD qp+4PHeotLaoc9L4wxO7XBLarzxQW/qRreJgiAEYz6GMMd42zcT/svyItZnEJxtIzaf/O9 StcePQDMSHOEz5edztekm1Bdz9Hgy6M= ARC-Authentication-Results: i=1; imf17.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=Fc2tq5XS; spf=pass (imf17.hostedemail.com: domain of lkp@intel.com designates 192.198.163.7 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1746069816; a=rsa-sha256; cv=none; b=awbKgx2ZnOeJPgIFs3eO+//5P+pQUihZn2JLZVYVMQu9PXpemNXaaeFVxV4g4y1X9aPje5 6IKcQ3K3/qlL2O+/IZGkyLa3/+80WHn+MmrrEM8yoehbQcoQG/O7OljujL2kcaIO3j+6sj LbBbv9TwbeHZpQQTLEh8urunXBYvYX8= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1746069815; x=1777605815; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=+19Gu4Iri61NQgs4mYjOXwJD8OBz2QH6Z2pnFSvbIio=; b=Fc2tq5XSc7X6HDg/W3sAfkMStwmaMT9JSybwTK++07ruaGulYMWUsFw5 zXXJzK7gOGpV0dxEY1+M2NVabwudocXl2fjkz8CnEZXGT6cdQh9hvhhD+ WSUES9bkFT5gL3Phb/LMJ5ojTiBvr4i0iDda/NE/nfAzQ0xm9LXT1dXek PHlI0j4363XMp9vhzsKUVk5Np6qZnDYs3MUttq49BoNpVnLDzFnD9WyTq XU47bQtLiBscZ9Bla348GF23f+pAXjAYQYzDVz00GmoDlPrWVyjVtjM/4 CoXdKAzG//jgh3ayuH0+QKbqdQk8j/PsTcdyEexFAfquNq8oGqrFTPZXa g==; X-CSE-ConnectionGUID: UgI//0qTT5qibq49ZHtzmQ== X-CSE-MsgGUID: KJpFMjEBSum1hJCEQHsXUw== X-IronPort-AV: E=McAfee;i="6700,10204,11419"; a="73136882" X-IronPort-AV: E=Sophos;i="6.15,253,1739865600"; d="scan'208";a="73136882" Received: from orviesa009.jf.intel.com ([10.64.159.149]) by fmvoesa101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Apr 2025 20:23:34 -0700 X-CSE-ConnectionGUID: PQUWvfaJS/ybTMOZlBwt6w== X-CSE-MsgGUID: JoGepA1fTjuYCerjhxy0+g== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.15,253,1739865600"; d="scan'208";a="134034716" Received: from lkp-server01.sh.intel.com (HELO 1992f890471c) ([10.239.97.150]) by orviesa009.jf.intel.com with ESMTP; 30 Apr 2025 20:23:31 -0700 Received: from kbuild by 1992f890471c with local (Exim 4.96) (envelope-from ) id 1uAKWG-0003vp-1K; Thu, 01 May 2025 03:23:28 +0000 Date: Thu, 1 May 2025 11:22:50 +0800 From: kernel test robot To: Alexander Gordeev , Andrew Morton , Andrey Ryabinin , Daniel Axtens Cc: oe-kbuild-all@lists.linux.dev, Linux Memory Management List , linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-s390@vger.kernel.org, stable@vger.kernel.org Subject: Re: [PATCH v3 1/1] kasan: Avoid sleepable page allocation from atomic context Message-ID: <202505010957.08s1jPkF-lkp@intel.com> References: <573a823565734e1eac3aa128fb9d3506ec918a72.1745940843.git.agordeev@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <573a823565734e1eac3aa128fb9d3506ec918a72.1745940843.git.agordeev@linux.ibm.com> X-Rspam-User: X-Rspamd-Server: rspam09 X-Rspamd-Queue-Id: 7339740007 X-Stat-Signature: hes6r11gnu7hnhfb4ib8ykimnhmyj4zg X-HE-Tag: 1746069815-235529 X-HE-Meta: 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 vNB0eOrB G0roJvjobv+CinTocRULtp6DEjdmHH551a3FPzwipdwPUIz8fQI1IAgmUUE+0YvuMQn82xQmgCFI8VvPQCGC/7XV2od/qJviX1IlzJedbHmAoli3DSVv5sOnBfYAPtlPT1vAX09fYachgdACwgQD2kvLfTi8qCgX4jxQJILgCw+AVUX+Y6i7JTphk0IgiaXaT83dz7d5utMTcIdzS8sewj3b3u0M18BAd6jFKJ6XB/cWkGoTlVrpzkoopdXIZttvdXqTljVmc10jQJ+mm76yrQN43u20B5LjrHrtZ6aFP/LNMuycncfeP2OGkGFK2+5oWPpbsUQtxnU+yDvpW0lhehxQTXQ8YxflUXHJ1sKYC2hb4vZXvF7HJhJeI6/uaUQ29vHCk6DWU9PQiRkad8ITcXJq9L7JhOjJwpJ3pguNUcUYXN3L+6t4lPJGGjBSuJgWjCknT X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi Alexander, kernel test robot noticed the following build warnings: [auto build test WARNING on akpm-mm/mm-everything] [also build test WARNING on linus/master v6.15-rc4 next-20250430] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Alexander-Gordeev/kasan-Avoid-sleepable-page-allocation-from-atomic-context/20250430-001020 base: https://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm.git mm-everything patch link: https://lore.kernel.org/r/573a823565734e1eac3aa128fb9d3506ec918a72.1745940843.git.agordeev%40linux.ibm.com patch subject: [PATCH v3 1/1] kasan: Avoid sleepable page allocation from atomic context config: x86_64-buildonly-randconfig-002-20250501 (https://download.01.org/0day-ci/archive/20250501/202505010957.08s1jPkF-lkp@intel.com/config) compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250501/202505010957.08s1jPkF-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202505010957.08s1jPkF-lkp@intel.com/ All warnings (new ones prefixed by >>): mm/kasan/shadow.c: In function 'kasan_populate_vmalloc_pte': mm/kasan/shadow.c:313:18: error: implicit declaration of function 'pfn_to_virt'; did you mean 'fix_to_virt'? [-Werror=implicit-function-declaration] 313 | __memset(pfn_to_virt(pfn), KASAN_VMALLOC_INVALID, PAGE_SIZE); | ^~~~~~~~~~~ | fix_to_virt >> mm/kasan/shadow.c:313:18: warning: passing argument 1 of '__memset' makes pointer from integer without a cast [-Wint-conversion] 313 | __memset(pfn_to_virt(pfn), KASAN_VMALLOC_INVALID, PAGE_SIZE); | ^~~~~~~~~~~~~~~~ | | | int In file included from arch/x86/include/asm/string.h:5, from arch/x86/include/asm/cpuid/api.h:10, from arch/x86/include/asm/cpuid.h:6, from arch/x86/include/asm/processor.h:19, from arch/x86/include/asm/cpufeature.h:5, from arch/x86/include/asm/thread_info.h:59, from include/linux/thread_info.h:60, from include/linux/spinlock.h:60, from arch/x86/include/asm/pgtable.h:19, from include/linux/pgtable.h:6, from include/linux/kasan.h:37, from mm/kasan/shadow.c:14: arch/x86/include/asm/string_64.h:23:22: note: expected 'void *' but argument is of type 'int' 23 | void *__memset(void *s, int c, size_t n); | ~~~~~~^ cc1: some warnings being treated as errors vim +/__memset +313 mm/kasan/shadow.c 299 300 static int kasan_populate_vmalloc_pte(pte_t *ptep, unsigned long addr, 301 void *_data) 302 { 303 struct vmalloc_populate_data *data = _data; 304 struct page *page; 305 unsigned long pfn; 306 pte_t pte; 307 308 if (likely(!pte_none(ptep_get(ptep)))) 309 return 0; 310 311 page = data->pages[PFN_DOWN(addr - data->start)]; 312 pfn = page_to_pfn(page); > 313 __memset(pfn_to_virt(pfn), KASAN_VMALLOC_INVALID, PAGE_SIZE); 314 pte = pfn_pte(pfn, PAGE_KERNEL); 315 316 spin_lock(&init_mm.page_table_lock); 317 if (likely(pte_none(ptep_get(ptep)))) 318 set_pte_at(&init_mm, addr, ptep, pte); 319 spin_unlock(&init_mm.page_table_lock); 320 321 return 0; 322 } 323 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki