Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp2380542pxb; Mon, 12 Apr 2021 23:58:29 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx77Y4mH0ksqCV0fdVDhSc1jfkFMSaCyPDdY7fxP+5xUEOP9gIDQHDJdJefTG0Hivvp6W0N X-Received: by 2002:a17:902:f2d1:b029:eb:2e32:8804 with SMTP id h17-20020a170902f2d1b02900eb2e328804mr1248406plc.40.1618297108831; Mon, 12 Apr 2021 23:58:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618297108; cv=none; d=google.com; s=arc-20160816; b=pAbjXBDPt+BCeUb44mMeWksP6H4xV+RHAlDzOuvzQ/2tVCUm5qMTc0+sB1oQEuW2TY a3M8CToHwmP/mbbWneNmtEt29APrjELaaN076e00M3ctQj14hHiz663f210I0AJFlMaP SI00aEpCwXdn8MEDuHKXqOQMiL69aWa4rUhcaL87NhgxnjI/wGFDQHI4FHiTsQ+OZqxy tNaTq+uAovGpwY7zt1hlWtDShrSyf6nzshQtlawVyxrTfaCH6yDRg7mlyklXlcY+BJfh Ec5qdIBvtac0H/qxd1OgOxKRgYe+UG6qR2m0dHD44eYBqOIqWigRsQAkyVsSLj+FdCUL Q4ew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=eiBVwhZ9obX2U+Yc2nbCcS/XJGirKgafH71+SqbthyM=; b=ibqAvurhV5Nf0KD8aZJrV0Shcs3pqMv4MrdKM/1liQy4NHcOWL+FZl3DmUtvDs8lTc b2m1wGT01Luhx/cK+xcvsySBCpMnGCd1pqRtDBBklf5C8P66+oR9+yQ9m+bW7r/vXySx qFHJIF+82pP6TrdzdAV3VT8LwcfUJAK30kt31R/05jfhtBdgzXvBn4Gl42mWx8KBjUZ9 tKyCq5B4VG0oxIN+w9Fqh6F4mpuBEdPyYRjm+NZB4c2rR9ndK42vdxyB1jSA/R5wCs6W rldbQSvjLM4Uaqf6fX5xLRMuGlwAEGoP/m/dQLWzam4wNzdrEPAXa8TjGhLKyHYf/DCe KgMA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d4si18250778pfd.1.2021.04.12.23.58.17; Mon, 12 Apr 2021 23:58:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237819AbhDLTmw (ORCPT + 99 others); Mon, 12 Apr 2021 15:42:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39038 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236309AbhDLTmr (ORCPT ); Mon, 12 Apr 2021 15:42:47 -0400 Received: from sipsolutions.net (s3.sipsolutions.net [IPv6:2a01:4f8:191:4433::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 183A3C061574 for ; Mon, 12 Apr 2021 12:42:26 -0700 (PDT) Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.94) (envelope-from ) id 1lW2S0-00ApNQ-6B; Mon, 12 Apr 2021 21:42:24 +0200 From: Johannes Berg To: Andrew Morton Cc: linux-kernel@vger.kernel.org, Nick Desaulniers , Johannes Berg Subject: [PATCH] gcov: clang: fix clang-11+ build Date: Mon, 12 Apr 2021 21:42:10 +0200 Message-Id: <20210412214210.6e1ecca9cdc5.I24459763acf0591d5e6b31c7e3a59890d802f79c@changeid> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johannes Berg With clang-11+, the code is broken due to my kvmalloc() conversion (which predated the clang-11 support code) leaving one vmalloc() in place. Fix that. Signed-off-by: Johannes Berg --- This fixes a clang-11 build issue reported against current linux-next since the clang-11+ support landed in v5.12-rc5 and my kvmalloc() conversion patch is in akpm/linux-next. I guess this should be folded into gcov: use kvmalloc() If desired, I can send a combined patch instead. --- kernel/gcov/clang.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/gcov/clang.c b/kernel/gcov/clang.c index 04a65443005d..d43ffd0c5ddb 100644 --- a/kernel/gcov/clang.c +++ b/kernel/gcov/clang.c @@ -368,7 +368,7 @@ static struct gcov_fn_info *gcov_fn_info_dup(struct gcov_fn_info *fn) INIT_LIST_HEAD(&fn_dup->head); cv_size = fn->num_counters * sizeof(fn->counters[0]); - fn_dup->counters = vmalloc(cv_size); + fn_dup->counters = kvmalloc(cv_size, GFP_KERNEL); if (!fn_dup->counters) { kfree(fn_dup); return NULL; -- 2.30.2