Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp1671611rwd; Sun, 28 May 2023 00:03:13 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5uuR4ve0wDa7rExE0+xpjYib/fMfkTsItOYTdmuiD/lY06qPFNOBcDWM61LusL123cCTj2 X-Received: by 2002:a05:6a20:441b:b0:10b:d22e:d419 with SMTP id ce27-20020a056a20441b00b0010bd22ed419mr6372881pzb.35.1685257393022; Sun, 28 May 2023 00:03:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685257393; cv=none; d=google.com; s=arc-20160816; b=S/b/pcYa+pbbzS3rho/AUvkNoy26IoYntXHv1IOE2aPV97Ss38TtnjWywO5QGRS1lb vpjAlGl2dvMCd38gaDr2LoIwuOh6kQY+kxGf3JU1TEmjX0XBNX+MKXXn+0/enAyZwJF+ yaiMUsXwZcH1pS3MuAKzt5KGkeu8vU6G97CnJv8Oq5a0XEVdaX50E2tVvYi4ul4qRjhQ N4MJ+1KdX1J22SZwXNEAUf5D4GvPQT9VTw0V5JVGCsCkOjGANXmx02Chw1HSPGei7nY9 sGZhJukJunVRbAGibT64ck8Zek15FXBHZ693G04lROGeC9ZXBmLTIx6y94kfQazmk7pV HlhA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=pz3zWWgOy+EsmGTmSf5EXZf73PxM4vKEMsoBOcinm8s=; b=aJRtdFz1s3cMCjTa0egKzhasCo76hgS9xmx+T8j1Im62/d6o26vENlxRAQcqJl/FuU YtFSHAYxKcdOz9n5YRzA1GWL7QRGCZEPEpryJCV6EvpBeCn2gsx5ldjKXUPlkHf9OqUJ CtfgyWvJ63NqPl2/vXBiG88k4np7NFQunIobrNvgXySDT+8KhrVCX1zXijqL1Xi3KDwp RvG/RiUZjiJOtvqvgnldB3K6CKkmYluWsYo9dair0uIWkWdrAwSofJ5V6wr91XELjb1O 2tDjrmkhI7B5F4AIuRmVE3PhTLfG2sWoXtd1jDsvjikh4XmId+u+/mTJ3nWaxj28qZXM 2b6Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=TVzqYUK+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c11-20020a63724b000000b005303b490638si4003754pgn.466.2023.05.28.00.02.58; Sun, 28 May 2023 00:03:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=TVzqYUK+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229498AbjE1G1C (ORCPT + 99 others); Sun, 28 May 2023 02:27:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51782 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229447AbjE1G1A (ORCPT ); Sun, 28 May 2023 02:27:00 -0400 Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C96CCD8 for ; Sat, 27 May 2023 23:26:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1685255219; x=1716791219; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=h1fX6J9MwHA4UhEIWnjjtlM/vEh0VODuOxy/W8XzQNw=; b=TVzqYUK+t4VpGPUhL8sTCF9GxmgyMV+AsMIaUrkRCmJGplb8vZLI84SX Xw55w9y+c1xRx3AROcL1Ja2yhku9F9o8NZWERmoiJMDi+NYjxSEyLo0Z3 FoZ8eth+4hOgwwGLIv6EEn9PtABquBqaFP7R3whxSa2fNtlfCzT4sQ0l4 0CfbexCbwzE8P2OfpgNXbSaKBW6Cw4aQXxSgnF0wT8pyv1kllFRcPIfQ4 loC6hj4vrSpjdcY6lD2g7YQoONcTD1C8QxYOBS6ql62OMWwwYi/2TQPks f5mfg0JPXWSQu/VofIkuoauznmfbSwa71oLn9jNXAOiZBinLqFkNbNWgY A==; X-IronPort-AV: E=McAfee;i="6600,9927,10723"; a="382742066" X-IronPort-AV: E=Sophos;i="6.00,198,1681196400"; d="scan'208";a="382742066" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 May 2023 23:26:59 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10723"; a="879980811" X-IronPort-AV: E=Sophos;i="6.00,198,1681196400"; d="scan'208";a="879980811" Received: from lkp-server01.sh.intel.com (HELO dea6d5a4f140) ([10.239.97.150]) by orsmga005.jf.intel.com with ESMTP; 27 May 2023 23:26:56 -0700 Received: from kbuild by dea6d5a4f140 with local (Exim 4.96) (envelope-from ) id 1q39rk-000KT0-0T; Sun, 28 May 2023 06:26:56 +0000 Date: Sun, 28 May 2023 14:26:51 +0800 From: kernel test robot To: Zhen Lei , Eric Biederman , Baoquan He , kexec@lists.infradead.org, linux-kernel@vger.kernel.org Cc: oe-kbuild-all@lists.linux.dev, Zhen Lei , Michael Holzheu , Andrew Morton , Linux Memory Management List , Amerigo Wang Subject: Re: [PATCH 5/6] kexec: add helper __crash_shrink_memory() Message-ID: <202305281410.FdGZvhsb-lkp@intel.com> References: <20230527123439.772-6-thunder.leizhen@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230527123439.772-6-thunder.leizhen@huawei.com> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Zhen, kernel test robot noticed the following build warnings: [auto build test WARNING on akpm-mm/mm-everything] [also build test WARNING on linus/master v6.4-rc3 next-20230525] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Zhen-Lei/kexec-fix-a-memory-leak-in-crash_shrink_memory/20230527-203821 base: https://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm.git mm-everything patch link: https://lore.kernel.org/r/20230527123439.772-6-thunder.leizhen%40huawei.com patch subject: [PATCH 5/6] kexec: add helper __crash_shrink_memory() config: x86_64-randconfig-s033-20230528 (https://download.01.org/0day-ci/archive/20230528/202305281410.FdGZvhsb-lkp@intel.com/config) compiler: gcc-11 (Debian 11.3.0-12) 11.3.0 reproduce: # apt-get install sparse # sparse version: v0.6.4-39-gce1a6720-dirty # https://github.com/intel-lab-lkp/linux/commit/dea97cef503d26e05d0e11818ae44176056ddf64 git remote add linux-review https://github.com/intel-lab-lkp/linux git fetch --no-tags linux-review Zhen-Lei/kexec-fix-a-memory-leak-in-crash_shrink_memory/20230527-203821 git checkout dea97cef503d26e05d0e11818ae44176056ddf64 # save the config file mkdir build_dir && cp config build_dir/.config make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=x86_64 olddefconfig make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=x86_64 SHELL=/bin/bash If you fix the issue, kindly add following tag where applicable | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202305281410.FdGZvhsb-lkp@intel.com/ sparse warnings: (new ones prefixed by >>) >> kernel/kexec_core.c:1108:5: sparse: sparse: symbol '__crash_shrink_memory' was not declared. Should it be static? -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki