Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp3160997ybi; Fri, 5 Jul 2019 02:58:35 -0700 (PDT) X-Google-Smtp-Source: APXvYqylXLcFQfaErOch4Z7vEsmq4GhDkEFF3xdVTn2aa9OxCKm/awl4fxHk/Q8LcdjqmwfZuLqR X-Received: by 2002:a17:90a:b883:: with SMTP id o3mr4323391pjr.50.1562320715882; Fri, 05 Jul 2019 02:58:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562320715; cv=none; d=google.com; s=arc-20160816; b=fx/wXM+RU7uTc/L9kepM1SrnjTA7edwdRPGMQ81I00nnMp1haQfwJtkV+kTqJL/gFB o5bdQ5yxhqkLwphYfq0WPP6Tb+Pj2f+7uqdOFMRUw5weySEyTPJo+SabcKLt+VZ5Vj0E gO+6K90vw3X1d4Sl+SqjXvmzfYLRMAmnTOCfapbGEpjKKMPE7lsPzacpLmSsaWET6A0S yZRJsmDKQO4lFb/rMs0L+38evk4wBqjIdeNKRsfin9hSk2YJgl8IiSNsaKbuYYMyYbR3 uQRzIQ5MB0p68qSa2niNSZKvCzi7mGHgwSXd/U+S0eDATMe/O2jxr0gqk+DD/KX9puzl KRkQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=zS8S9H9AbLZAyLr81qb94mZjTnAH3YzyDKOLBvj6lLk=; b=TfasVSb5DinTYT1RBAfnzdXpQSy2rh+FZeRg3gwpcz4VJS4wDz1zPm6ZEH7ELngHWt cH6/qt513XHSBxy4ZIZ4mFOz5VBJcJiDhli/u4AB9sEtGtqAodYWgJtXm7SixkejHZg1 BZOTTwp1eS/aFnBnBT7bTdnhvGcSDpQ1RLjyDEipMb2oAatbBioUBJ9ROge0/7amNtvi m5trWothChvmRJfTqK7BZ0dW1kfEp49AMYO5lPIMshEwobRIXhYKJEus3SmnECOtmHes gWvQQ0xv16Aq1/fbhPok9BmsvGYW883le235eQlOhb0XuVSl/dv0h9WvWBSAQNLQTYX0 F5rQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=iDK20ETp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g8si7979252plt.273.2019.07.05.02.58.20; Fri, 05 Jul 2019 02:58:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=iDK20ETp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727295AbfGEJ2L (ORCPT + 99 others); Fri, 5 Jul 2019 05:28:11 -0400 Received: from mail-oi1-f194.google.com ([209.85.167.194]:39932 "EHLO mail-oi1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726505AbfGEJ2K (ORCPT ); Fri, 5 Jul 2019 05:28:10 -0400 Received: by mail-oi1-f194.google.com with SMTP id m202so6720115oig.6 for ; Fri, 05 Jul 2019 02:28:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=zS8S9H9AbLZAyLr81qb94mZjTnAH3YzyDKOLBvj6lLk=; b=iDK20ETpNO7KF5Suti87dkpQGGE94gt/WqR+UuMVEAldoiGs9wASNGYTNJm/jTnsMD eHGFCv3jGE98FwKAL0+b+QgMGmDBwnJRtC0ELAXyRv8QwlYpcLcxHtdDRDa7IVfNJQsG 92wQuonQuWjRA9KSTw6S6YYrlfM7n3KLQNPLW/aSm3ILK805vtgd63hUPfqzk3eDWkW8 nR3/asQvqhHOVQM0fjUCMZr+xHVQMIlo8bN07BzmFdP1LwD/bfsJzHPM2Qv04C07m+iw LnIf918+wXa3gSJ3/G0W7ZoThxxOLq6qI/h4F7iJTxZi4lbV7MditpnAehJVY89Zi5sU 0nng== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=zS8S9H9AbLZAyLr81qb94mZjTnAH3YzyDKOLBvj6lLk=; b=PpC2JA+Jj28I3B6dJ6x/5LFm9ktk8Er6Khx5F587kZDYMGFcffln131xNp/Icy/sAs fd/pU7++s6zF2moKNKGsQ34W/8VoOJBxYxfrMNwvIOnZg1NoVFyfDUROZUwWc7nchzHh oyv9Z9vxuZLvNQX+3gKO+ALTew9PbEmU9v4yGIDrSJFb1mq3kZb09Y5FXCG1P1ets2oe ypHrdWQudT6Ze7gsEp07NcQASPTNUFhXaN7CIHr4a9+eMAGtFAklUhvRREoZmC8ETcFK +9uFTyVuiQfgKRZ2zbDw0fsKlAAqgD/Osk5qqvyQszAOsFPUOytXxoBqXVyboJk6DsB9 CVdQ== X-Gm-Message-State: APjAAAUeJr1x94X+eIJhuIywg6sZlQ2A8ISvE+x+S9ANQ5F1omNpMy+e JQFIH/zyl2PHsssPFZyt2n6vxW/7lvL2INWH4n3ruzVl X-Received: by 2002:aca:6104:: with SMTP id v4mr1529831oib.172.1562318889763; Fri, 05 Jul 2019 02:28:09 -0700 (PDT) MIME-Version: 1.0 References: <20190705184949.13cdd021@canb.auug.org.au> In-Reply-To: <20190705184949.13cdd021@canb.auug.org.au> From: Marco Elver Date: Fri, 5 Jul 2019 11:27:58 +0200 Message-ID: Subject: Re: linux-next: build failure after merge of the akpm-current tree To: Stephen Rothwell Cc: Andrew Morton , Linux Next Mailing List , Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 5 Jul 2019 at 10:49, Stephen Rothwell wrote: > > Hi all, > > After merging the akpm-current tree, today's linux-next build (arm > multi_v7_defconfig) failed like this: > > In file included from include/linux/compiler.h:257, > from arch/arm/kernel/asm-offsets.c:10: > include/linux/kasan-checks.h:14:15: error: unknown type name 'bool' > static inline bool __kasan_check_read(const volatile void *p, unsigned int size) > ^~~~ > include/linux/kasan-checks.h:18:15: error: unknown type name 'bool' > static inline bool __kasan_check_write(const volatile void *p, unsigned int size) > ^~~~ > include/linux/kasan-checks.h:38:15: error: unknown type name 'bool' > static inline bool kasan_check_read(const volatile void *p, unsigned int size) > ^~~~ > include/linux/kasan-checks.h:42:15: error: unknown type name 'bool' > static inline bool kasan_check_write(const volatile void *p, unsigned int size) > ^~~~ > > Caused by commit > > 4bb170e54bbd ("mm/kasan: change kasan_check_{read,write} to return boolean") > > I have added the following patch for today: > > From: Stephen Rothwell > Date: Fri, 5 Jul 2019 18:44:55 +1000 > Subject: [PATCH] mm/kasan: include types.h for "bool" > > Signed-off-by: Stephen Rothwell > --- > include/linux/kasan-checks.h | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/include/linux/kasan-checks.h b/include/linux/kasan-checks.h > index 2c7f0b6307b2..53cbf0ae14b5 100644 > --- a/include/linux/kasan-checks.h > +++ b/include/linux/kasan-checks.h > @@ -2,6 +2,8 @@ > #ifndef _LINUX_KASAN_CHECKS_H > #define _LINUX_KASAN_CHECKS_H > > +#include > + > /* > * __kasan_check_*: Always available when KASAN is enabled. This may be used > * even in compilation units that selectively disable KASAN, but must use KASAN > -- > 2.20.1 > > -- > Cheers, > Stephen Rothwell Apologies for the breakage -- thanks for the fix! Shall I send a v+1 or will your patch persist?