CC: [email protected]
CC: Linux Memory Management List <[email protected]>
TO: "Matthew Wilcox (Oracle)" <[email protected]>
CC: Andrew Morton <[email protected]>
CC: Linux Memory Management List <[email protected]>

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git 
master
head:   abaf6f60176f1ae9d946d63e4db63164600b7b1a
commit: e8805271b82793e6d1f3de786c2278e4d622bdb6 [11581/11865] mm/gfp: add 
kernel-doc for gfp_t
:::::: branch date: 30 hours ago
:::::: commit date: 2 days ago
config: powerpc64-randconfig-s031-20210220 (attached as .config)
compiler: powerpc-linux-gcc (GCC) 9.3.0
reproduce:
        wget 
https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O 
~/bin/make.cross
        chmod +x ~/bin/make.cross
        # apt-get install sparse
        # sparse version: v0.6.3-229-g60c1f270-dirty
        # 
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=e8805271b82793e6d1f3de786c2278e4d622bdb6
        git remote add linux-next 
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
        git fetch --no-tags linux-next master
        git checkout e8805271b82793e6d1f3de786c2278e4d622bdb6
        # save the attached .config to linux build tree
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-9.3.0 make.cross C=1 
CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' ARCH=powerpc64 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <[email protected]>


"sparse warnings: (new ones prefixed by >>)"
   mm/kasan/common.c: note: in included file (through include/linux/mm.h, 
include/linux/memblock.h):
   include/linux/gfp.h:20:32: sparse: sparse: symbol 'gfp_t' redeclared with 
different type (different base types):
   include/linux/gfp.h:20:32: sparse:    restricted gfp_t [usertype] gfp_t
   mm/kasan/common.c: note: in included file (through 
include/linux/kasan-checks.h, include/asm-generic/rwonce.h, 
arch/powerpc/include/generated/asm/rwonce.h, ...):
   include/linux/types.h:148:32: sparse: note: previously declared as:
   include/linux/types.h:148:32: sparse:    restricted gfp_t [usertype] gfp_t
   mm/kasan/common.c:433:6: sparse: sparse: symbol '__kasan_slab_alloc' 
redeclared with different type (incompatible argument 3 (different base types)):
>> mm/kasan/common.c:433:6: sparse:    void *extern [addressable] [toplevel] 
>> __kasan_slab_alloc( ... )
   mm/kasan/common.c: note: in included file:
   include/linux/kasan.h:202:6: sparse: note: previously declared as:
>> include/linux/kasan.h:202:6: sparse:    void *extern [addressable] 
>> [toplevel] __kasan_slab_alloc( ... )
   mm/kasan/common.c:439:6: sparse: sparse: symbol '__kasan_kmalloc' redeclared 
with different type (incompatible argument 4 (different base types)):
>> mm/kasan/common.c:439:6: sparse:    void *extern [addressable] [toplevel] 
>> __kasan_kmalloc( ... )
   include/linux/kasan.h:212:6: sparse: note: previously declared as:
>> include/linux/kasan.h:212:6: sparse:    void *extern [addressable] 
>> [toplevel] __kasan_kmalloc( ... )
   mm/kasan/common.c:446:6: sparse: sparse: symbol '__kasan_kmalloc_large' 
redeclared with different type (incompatible argument 3 (different base types)):
>> mm/kasan/common.c:446:6: sparse:    void *extern [addressable] [toplevel] 
>> __kasan_kmalloc_large( ... )
   include/linux/kasan.h:222:6: sparse: note: previously declared as:
>> include/linux/kasan.h:222:6: sparse:    void *extern [addressable] 
>> [toplevel] __kasan_kmalloc_large( ... )
   mm/kasan/common.c:471:6: sparse: sparse: symbol '__kasan_krealloc' 
redeclared with different type (incompatible argument 3 (different base types)):
>> mm/kasan/common.c:471:6: sparse:    void *extern [addressable] [toplevel] 
>> __kasan_krealloc( ... )
   include/linux/kasan.h:232:6: sparse: note: previously declared as:
>> include/linux/kasan.h:232:6: sparse:    void *extern [addressable] 
>> [toplevel] __kasan_krealloc( ... )

vim +433 mm/kasan/common.c

a3fe7cdf02e318 Andrey Konovalov        2019-01-08  432  
34303244f2615a Andrey Konovalov        2020-12-22 @433  void * __must_check 
__kasan_slab_alloc(struct kmem_cache *cache,
34303244f2615a Andrey Konovalov        2020-12-22  434                          
                void *object, gfp_t flags)
e1db95befb3e9e Andrey Konovalov        2019-02-20  435  {
34303244f2615a Andrey Konovalov        2020-12-22  436          return 
____kasan_kmalloc(cache, object, cache->object_size, flags, false);
e1db95befb3e9e Andrey Konovalov        2019-02-20  437  }
e1db95befb3e9e Andrey Konovalov        2019-02-20  438  
34303244f2615a Andrey Konovalov        2020-12-22 @439  void * __must_check 
__kasan_kmalloc(struct kmem_cache *cache, const void *object,
a3fe7cdf02e318 Andrey Konovalov        2019-01-08  440                          
                size_t size, gfp_t flags)
a3fe7cdf02e318 Andrey Konovalov        2019-01-08  441  {
34303244f2615a Andrey Konovalov        2020-12-22  442          return 
____kasan_kmalloc(cache, object, size, flags, true);
a3fe7cdf02e318 Andrey Konovalov        2019-01-08  443  }
34303244f2615a Andrey Konovalov        2020-12-22  444  
EXPORT_SYMBOL(__kasan_kmalloc);
bffa986c6f80e3 Andrey Konovalov        2018-12-28  445  
34303244f2615a Andrey Konovalov        2020-12-22 @446  void * __must_check 
__kasan_kmalloc_large(const void *ptr, size_t size,
66afc7f1e07a1d Andrey Konovalov        2018-12-28  447                          
                        gfp_t flags)
bffa986c6f80e3 Andrey Konovalov        2018-12-28  448  {
bffa986c6f80e3 Andrey Konovalov        2018-12-28  449          struct page 
*page;
bffa986c6f80e3 Andrey Konovalov        2018-12-28  450          unsigned long 
redzone_start;
bffa986c6f80e3 Andrey Konovalov        2018-12-28  451          unsigned long 
redzone_end;
bffa986c6f80e3 Andrey Konovalov        2018-12-28  452  
bffa986c6f80e3 Andrey Konovalov        2018-12-28  453          if 
(gfpflags_allow_blocking(flags))
f2fd73bd72263f Andrey Konovalov        2021-02-19  454                  
kasan_quarantine_reduce();
bffa986c6f80e3 Andrey Konovalov        2018-12-28  455  
bffa986c6f80e3 Andrey Konovalov        2018-12-28  456          if 
(unlikely(ptr == NULL))
bffa986c6f80e3 Andrey Konovalov        2018-12-28  457                  return 
NULL;
bffa986c6f80e3 Andrey Konovalov        2018-12-28  458  
bffa986c6f80e3 Andrey Konovalov        2018-12-28  459          page = 
virt_to_page(ptr);
bffa986c6f80e3 Andrey Konovalov        2018-12-28  460          redzone_start = 
round_up((unsigned long)(ptr + size),
1f600626b3a9b7 Andrey Konovalov        2020-12-22  461                          
        KASAN_GRANULE_SIZE);
a50b854e073cd3 Matthew Wilcox (Oracle  2019-09-23  462)         redzone_end = 
(unsigned long)ptr + page_size(page);
bffa986c6f80e3 Andrey Konovalov        2018-12-28  463  
f2fd73bd72263f Andrey Konovalov        2021-02-19  464          
kasan_unpoison(ptr, size);
f2fd73bd72263f Andrey Konovalov        2021-02-19  465          
kasan_poison((void *)redzone_start, redzone_end - redzone_start,
bffa986c6f80e3 Andrey Konovalov        2018-12-28  466                       
KASAN_PAGE_REDZONE);
bffa986c6f80e3 Andrey Konovalov        2018-12-28  467  
bffa986c6f80e3 Andrey Konovalov        2018-12-28  468          return (void 
*)ptr;
bffa986c6f80e3 Andrey Konovalov        2018-12-28  469  }
bffa986c6f80e3 Andrey Konovalov        2018-12-28  470  
34303244f2615a Andrey Konovalov        2020-12-22 @471  void * __must_check 
__kasan_krealloc(const void *object, size_t size, gfp_t flags)
bffa986c6f80e3 Andrey Konovalov        2018-12-28  472  {
bffa986c6f80e3 Andrey Konovalov        2018-12-28  473          struct page 
*page;
bffa986c6f80e3 Andrey Konovalov        2018-12-28  474  
bffa986c6f80e3 Andrey Konovalov        2018-12-28  475          if 
(unlikely(object == ZERO_SIZE_PTR))
bffa986c6f80e3 Andrey Konovalov        2018-12-28  476                  return 
(void *)object;
bffa986c6f80e3 Andrey Konovalov        2018-12-28  477  
bffa986c6f80e3 Andrey Konovalov        2018-12-28  478          page = 
virt_to_head_page(object);
bffa986c6f80e3 Andrey Konovalov        2018-12-28  479  
bffa986c6f80e3 Andrey Konovalov        2018-12-28  480          if 
(unlikely(!PageSlab(page)))
34303244f2615a Andrey Konovalov        2020-12-22  481                  return 
__kasan_kmalloc_large(object, size, flags);
bffa986c6f80e3 Andrey Konovalov        2018-12-28  482          else
34303244f2615a Andrey Konovalov        2020-12-22  483                  return 
____kasan_kmalloc(page->slab_cache, object, size,
a3fe7cdf02e318 Andrey Konovalov        2019-01-08  484                          
                        flags, true);
bffa986c6f80e3 Andrey Konovalov        2018-12-28  485  }
bffa986c6f80e3 Andrey Konovalov        2018-12-28  486  

:::::: The code at line 433 was first introduced by commit
:::::: 34303244f2615add92076a4bf2d4f39323bde4f2 kasan, mm: check kasan_enabled 
in annotations

:::::: TO: Andrey Konovalov <[email protected]>
:::::: CC: Linus Torvalds <[email protected]>

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/[email protected]

Attachment: .config.gz
Description: application/gzip

_______________________________________________
kbuild mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to