From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.7]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CC1241EA7EB; Thu, 1 May 2025 03:23:34 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.7 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746069817; cv=none; b=KJRVvnymHv8eh5em3pls5kv38b+yKTtkgF9tfkOSNNe8gpGC04o00jAU8IY+qOijQGVtTUQKKHLiYv7JbV7zbD4WUiJXSdXeZGrvyqby5IMymNiVrCubxY4rtVJXB/sAy+NTuKQ5PjRwZ47KAQUmMmkuj2M//8KpLVW+l6MCUKk= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1746069817; c=relaxed/simple; bh=+19Gu4Iri61NQgs4mYjOXwJD8OBz2QH6Z2pnFSvbIio=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=f/IlsHxrXXPvgalApx86+wUA2U9aBOoejTEV0W9TKLFIwPDTuXTnxvvZM0pcVGvAZB1GpyPKR9eO3ImjOFSLPFR4Fd33QRt8+36Ol333cOh+yLExovpktBFd1CUPg+/LdmqMb9f7xUBKUUjkdkO3FRpm1ioqXCImEtAopm88Jz4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=Fc2tq5XS; arc=none smtp.client-ip=192.198.163.7 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="Fc2tq5XS" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1746069815; x=1777605815; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=+19Gu4Iri61NQgs4mYjOXwJD8OBz2QH6Z2pnFSvbIio=; b=Fc2tq5XSc7X6HDg/W3sAfkMStwmaMT9JSybwTK++07ruaGulYMWUsFw5 zXXJzK7gOGpV0dxEY1+M2NVabwudocXl2fjkz8CnEZXGT6cdQh9hvhhD+ WSUES9bkFT5gL3Phb/LMJ5ojTiBvr4i0iDda/NE/nfAzQ0xm9LXT1dXek PHlI0j4363XMp9vhzsKUVk5Np6qZnDYs3MUttq49BoNpVnLDzFnD9WyTq XU47bQtLiBscZ9Bla348GF23f+pAXjAYQYzDVz00GmoDlPrWVyjVtjM/4 CoXdKAzG//jgh3ayuH0+QKbqdQk8j/PsTcdyEexFAfquNq8oGqrFTPZXa g==; X-CSE-ConnectionGUID: Icp82iTlRamBWVHYfAGqdw== X-CSE-MsgGUID: UViyNnK/SeCA5m9wIREmeQ== X-IronPort-AV: E=McAfee;i="6700,10204,11419"; a="73136881" X-IronPort-AV: E=Sophos;i="6.15,253,1739865600"; d="scan'208";a="73136881" Received: from orviesa009.jf.intel.com ([10.64.159.149]) by fmvoesa101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Apr 2025 20:23:34 -0700 X-CSE-ConnectionGUID: PQUWvfaJS/ybTMOZlBwt6w== X-CSE-MsgGUID: JoGepA1fTjuYCerjhxy0+g== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.15,253,1739865600"; d="scan'208";a="134034716" Received: from lkp-server01.sh.intel.com (HELO 1992f890471c) ([10.239.97.150]) by orviesa009.jf.intel.com with ESMTP; 30 Apr 2025 20:23:31 -0700 Received: from kbuild by 1992f890471c with local (Exim 4.96) (envelope-from ) id 1uAKWG-0003vp-1K; Thu, 01 May 2025 03:23:28 +0000 Date: Thu, 1 May 2025 11:22:50 +0800 From: kernel test robot To: Alexander Gordeev , Andrew Morton , Andrey Ryabinin , Daniel Axtens Cc: oe-kbuild-all@lists.linux.dev, Linux Memory Management List , linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-s390@vger.kernel.org, stable@vger.kernel.org Subject: Re: [PATCH v3 1/1] kasan: Avoid sleepable page allocation from atomic context Message-ID: <202505010957.08s1jPkF-lkp@intel.com> References: <573a823565734e1eac3aa128fb9d3506ec918a72.1745940843.git.agordeev@linux.ibm.com> Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <573a823565734e1eac3aa128fb9d3506ec918a72.1745940843.git.agordeev@linux.ibm.com> Hi Alexander, kernel test robot noticed the following build warnings: [auto build test WARNING on akpm-mm/mm-everything] [also build test WARNING on linus/master v6.15-rc4 next-20250430] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Alexander-Gordeev/kasan-Avoid-sleepable-page-allocation-from-atomic-context/20250430-001020 base: https://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm.git mm-everything patch link: https://lore.kernel.org/r/573a823565734e1eac3aa128fb9d3506ec918a72.1745940843.git.agordeev%40linux.ibm.com patch subject: [PATCH v3 1/1] kasan: Avoid sleepable page allocation from atomic context config: x86_64-buildonly-randconfig-002-20250501 (https://download.01.org/0day-ci/archive/20250501/202505010957.08s1jPkF-lkp@intel.com/config) compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250501/202505010957.08s1jPkF-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202505010957.08s1jPkF-lkp@intel.com/ All warnings (new ones prefixed by >>): mm/kasan/shadow.c: In function 'kasan_populate_vmalloc_pte': mm/kasan/shadow.c:313:18: error: implicit declaration of function 'pfn_to_virt'; did you mean 'fix_to_virt'? [-Werror=implicit-function-declaration] 313 | __memset(pfn_to_virt(pfn), KASAN_VMALLOC_INVALID, PAGE_SIZE); | ^~~~~~~~~~~ | fix_to_virt >> mm/kasan/shadow.c:313:18: warning: passing argument 1 of '__memset' makes pointer from integer without a cast [-Wint-conversion] 313 | __memset(pfn_to_virt(pfn), KASAN_VMALLOC_INVALID, PAGE_SIZE); | ^~~~~~~~~~~~~~~~ | | | int In file included from arch/x86/include/asm/string.h:5, from arch/x86/include/asm/cpuid/api.h:10, from arch/x86/include/asm/cpuid.h:6, from arch/x86/include/asm/processor.h:19, from arch/x86/include/asm/cpufeature.h:5, from arch/x86/include/asm/thread_info.h:59, from include/linux/thread_info.h:60, from include/linux/spinlock.h:60, from arch/x86/include/asm/pgtable.h:19, from include/linux/pgtable.h:6, from include/linux/kasan.h:37, from mm/kasan/shadow.c:14: arch/x86/include/asm/string_64.h:23:22: note: expected 'void *' but argument is of type 'int' 23 | void *__memset(void *s, int c, size_t n); | ~~~~~~^ cc1: some warnings being treated as errors vim +/__memset +313 mm/kasan/shadow.c 299 300 static int kasan_populate_vmalloc_pte(pte_t *ptep, unsigned long addr, 301 void *_data) 302 { 303 struct vmalloc_populate_data *data = _data; 304 struct page *page; 305 unsigned long pfn; 306 pte_t pte; 307 308 if (likely(!pte_none(ptep_get(ptep)))) 309 return 0; 310 311 page = data->pages[PFN_DOWN(addr - data->start)]; 312 pfn = page_to_pfn(page); > 313 __memset(pfn_to_virt(pfn), KASAN_VMALLOC_INVALID, PAGE_SIZE); 314 pte = pfn_pte(pfn, PAGE_KERNEL); 315 316 spin_lock(&init_mm.page_table_lock); 317 if (likely(pte_none(ptep_get(ptep)))) 318 set_pte_at(&init_mm, addr, ptep, pte); 319 spin_unlock(&init_mm.page_table_lock); 320 321 return 0; 322 } 323 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki