Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp3862793ybe; Mon, 16 Sep 2019 02:36:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqyOR7Z+wuADmFW8RCEMek78mMOlyh5WGYrDiactLlNEiO/YKzJd6N9buFw8E/sb9jPBBAYg X-Received: by 2002:a17:906:4544:: with SMTP id s4mr4268589ejq.116.1568626614381; Mon, 16 Sep 2019 02:36:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568626614; cv=none; d=google.com; s=arc-20160816; b=ko9r3TKphCLLi9PyxiwPhcdnOM4hv7y2cebPjK8uJdtVNacCCw50Z7EUFBqdOu8a16 RwEtWrss5lhUTlv4W4qg9tqwU0GGzb5iUD9P2sPw7W2VPpcyCxjPwq4EYPz+qlfI/h9h X7MNbIJ7+yLUV10AmWrvmp4djyTZbfEH/37zRruN/9WOx5CA1/euOUWwKv13+9ZCfQWl DtMPSS6s6IMhonfVPeroYA5sOH96BCxN+2hq6zJr/Vwg/fevThJC8f5wQX6vZJzShRiH 4YbGJkKIcrGYDmYLMlKq86hUEnoY3Mxi9q/SRY4iulbxseGl6hdx3XNgGo0Lkm/lfRk9 pxVQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=JPEyg+2/cR8JRvlsr+Q4ZdKbbfeb//PEC6qw4koR/RU=; b=S2l0ASjrdeybCyLp8hL4jc+ATlhktaA8t2d/8xJgkfLAIWW6EgdDH7kNq0lQA4ssgX ysgl7iiqKaqITEy/vX5nE2atvlqaf2jm4KFSG76J9LD/IfhTdAiT5K4YZcvUiGcH8bpH 7l4g3OWU1toniMdChtuznARdD1B+mhTSLQBzMDsRTT1ky+6x74PGneoLZNhcHUQ457Ak mzSdJFSsb3RmzBhqb1IK/qs7x5vSgacuibVdkbjxyMv+YkucVjMJff4llvBLBqQxr4r2 8vBJKTdAHd0D8fEQBcdNBifTzhTVl9X0vx0vegs3YrLr5kMBxWWFTOzB2Yh67GtYNkpv 5mhw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a3si21389957edc.75.2019.09.16.02.36.30; Mon, 16 Sep 2019 02:36:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728369AbfIPEyQ (ORCPT + 99 others); Mon, 16 Sep 2019 00:54:16 -0400 Received: from mga18.intel.com ([134.134.136.126]:24862 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726128AbfIPEyP (ORCPT ); Mon, 16 Sep 2019 00:54:15 -0400 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from orsmga006.jf.intel.com ([10.7.209.51]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 15 Sep 2019 21:54:15 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.64,492,1559545200"; d="scan'208";a="190964364" Received: from lkp-server01.sh.intel.com (HELO lkp-server01) ([10.239.97.150]) by orsmga006.jf.intel.com with ESMTP; 15 Sep 2019 21:54:12 -0700 Received: from kbuild by lkp-server01 with local (Exim 4.89) (envelope-from ) id 1i9j1g-0003jq-5a; Mon, 16 Sep 2019 12:54:12 +0800 Date: Mon, 16 Sep 2019 12:53:50 +0800 From: kbuild test robot To: Pengfei Li Cc: kbuild-all@01.org, akpm@linux-foundation.org, vbabka@suse.cz, cl@linux.com, penberg@kernel.org, rientjes@google.com, iamjoonsoo.kim@lge.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, guro@fb.com, Pengfei Li Subject: [RFC PATCH] mm, slab_common: all_kmalloc_info[] can be static Message-ID: <20190916045350.2buptf4exdnbxttf@48261080c7f1> References: <20190915170809.10702-6-lpf.vector@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190915170809.10702-6-lpf.vector@gmail.com> X-Patchwork-Hint: ignore User-Agent: NeoMutt/20170113 (1.7.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fixes: 95f3b3d20e9b ("mm, slab_common: Make kmalloc_caches[] start at size KMALLOC_MIN_SIZE") Signed-off-by: kbuild test robot --- slab_common.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mm/slab_common.c b/mm/slab_common.c index 2aed30deb0714..bf1cf4ba35f86 100644 --- a/mm/slab_common.c +++ b/mm/slab_common.c @@ -1118,7 +1118,7 @@ struct kmem_cache *kmalloc_slab(size_t size, gfp_t flags) * time. kmalloc_index() supports up to 2^26=64MB, so the final entry of the * table is kmalloc-67108864. */ -const struct kmalloc_info_struct all_kmalloc_info[] __initconst = { +static const struct kmalloc_info_struct all_kmalloc_info[] __initconst = { SET_KMALLOC_SIZE( 8, 8), SET_KMALLOC_SIZE( 16, 16), SET_KMALLOC_SIZE( 32, 32), SET_KMALLOC_SIZE( 64, 64), #if KMALLOC_SIZE_96_EXIST == 1