Received: by 2002:a05:7412:85a1:b0:e2:908c:2ebd with SMTP id n33csp191850rdh; Mon, 30 Oct 2023 19:46:46 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFxdM+DIJgtBNMMFRmH16DfHSPYE1WKwxyLaT4GjMS6Hq6LW1rY/XkxZr6e+j2qOcu6fLRt X-Received: by 2002:a17:902:e80b:b0:1cc:32df:8ebc with SMTP id u11-20020a170902e80b00b001cc32df8ebcmr5888009plg.28.1698720406204; Mon, 30 Oct 2023 19:46:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698720406; cv=none; d=google.com; s=arc-20160816; b=mcLOhdKNh8Q0SNjWxW76jDEnFxodMeDUtBYerRc5bGlXZ/kuyPi3S61wC8dlh1EpfZ nOtgUJDzb9W8zq1jhDgwRF37dNNlaOA8VDr11k/CrBazYB7SvC8nCWlkzs2x6oTqWdeJ Bf1xjB3oZMk01jxm3+jp25xxHOS5YyWgUCKLcZQV/g+Bp811GZygGuF08qfDhk6l3sGm J88eKootdvN8cOiXWz9v/7FTDU3TpZBboQ5rqCkQY56ZKM2vCiI+NOJ+tPHgckfn9ssG 52JODUCH7DOtQJA7TVuUdzhO0u1ix78pLbs/zNR5K/QiyWRMM0DGf9z1lVdEHNJncDWQ dhYg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=iEWD/6g2sdGEG1WWWJ9kgmA/x256DOzJ3Y6DK9gXyr0=; fh=TBKdDCDTq8qPoGqSZO3WX2wRDbZGM7GDrfnwLS0nc78=; b=vDdJYzDq5BoOF5hRcNwdQC+7CbH0uryjfn+GauoZDuPLznH5oD1spYAXLIkQCNhzex WufYoXvGUPfOJ5RvhSP1Ojk1beCIB5x8xMOgqcD6qe3beQjl0ZLonG+f5iKs6XWkU+Ia FIXL1DZlDKeN9HOnw/mRCvT0xmFDfdE1kDZGNFO9Ka1hhsZ1/ilaAF969oaHd/FlZtRg NCg7QK2e8EEYVqkTeON5zIafDFMPnrAJ4rIreaeZzIDYeUdpw70187qZ8A3tf6RSzVWm f3gMWywf/ikpq5+G29z/Jkg0NKpIid6Ercw1Lw/z0MHMmwp3O50gub1DG+NYaxj3RPc6 Lmzw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=UySpoIkZ; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from howler.vger.email (howler.vger.email. [23.128.96.34]) by mx.google.com with ESMTPS id w13-20020a170902e88d00b001c60e273252si327052plg.25.2023.10.30.19.46.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 30 Oct 2023 19:46:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) client-ip=23.128.96.34; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=UySpoIkZ; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 23.128.96.34 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id D220980412DC; Mon, 30 Oct 2023 19:46:20 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231825AbjJaCqK (ORCPT + 99 others); Mon, 30 Oct 2023 22:46:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51560 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229766AbjJaCqJ (ORCPT ); Mon, 30 Oct 2023 22:46:09 -0400 Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.115]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 917989F for ; Mon, 30 Oct 2023 19:46:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1698720365; x=1730256365; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=VRtT5LbzFmqKo5qD5luqKATUJRocT7sJW8P3VJh0sTE=; b=UySpoIkZ8GVDAOqNUo1a+jhl/gjiyG3qK829dEADtQsfanpt6MrBYoER bmjFfsa9XF5ZDZ2PnNGjH9Vm+d9W8yARTNmZXaPjX9cFX29OL1CIWTX9o dn+gVgnitbNSdoK2eZw3BF89JvARm+n68dD2YJFZ+CyZUkVbgxEBhWUjY 3Wt4+e5fjvoyvUjyV1iYvyZVpAZ8tzqnhpvBsv+zQHOKut92Ddw/jE6HC gSRcpXv04j9TzAK1aP/yEZWs8XAdz3OYvz8QP60m6wyEMK9P299+k2rNh WY9aiOikow5/FGclANC30DXl0vHwICOlG/wsxUj2N+Mnf7kFFrrNFZTFl w==; X-IronPort-AV: E=McAfee;i="6600,9927,10879"; a="388021492" X-IronPort-AV: E=Sophos;i="6.03,264,1694761200"; d="scan'208";a="388021492" Received: from fmviesa002.fm.intel.com ([10.60.135.142]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 30 Oct 2023 19:46:05 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.03,264,1694761200"; d="scan'208";a="1696298" Received: from lkp-server01.sh.intel.com (HELO 8917679a5d3e) ([10.239.97.150]) by fmviesa002.fm.intel.com with ESMTP; 30 Oct 2023 19:46:03 -0700 Received: from kbuild by 8917679a5d3e with local (Exim 4.96) (envelope-from ) id 1qxelU-000Dlg-2Q; Tue, 31 Oct 2023 02:46:00 +0000 Date: Tue, 31 Oct 2023 10:45:36 +0800 From: kernel test robot To: NeilBrown , Chuck Lever , Jeff Layton Cc: oe-kbuild-all@lists.linux.dev, linux-nfs@vger.kernel.org, Olga Kornievskaia , Dai Ngo , Tom Talpey Subject: Re: [PATCH 1/6] nfsd: prepare for supporting admin-revocation of state Message-ID: <202310311025.kdFXiVKx-lkp@intel.com> References: <20231027015613.26247-2-neilb@suse.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231027015613.26247-2-neilb@suse.de> X-Spam-Status: No, score=-1.3 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Mon, 30 Oct 2023 19:46:21 -0700 (PDT) Hi NeilBrown, kernel test robot noticed the following build errors: [auto build test ERROR on linus/master] [also build test ERROR on v6.6 next-20231030] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/NeilBrown/nfsd-prepare-for-supporting-admin-revocation-of-state/20231027-095832 base: linus/master patch link: https://lore.kernel.org/r/20231027015613.26247-2-neilb%40suse.de patch subject: [PATCH 1/6] nfsd: prepare for supporting admin-revocation of state config: arm-keystone_defconfig (https://download.01.org/0day-ci/archive/20231031/202310311025.kdFXiVKx-lkp@intel.com/config) compiler: arm-linux-gnueabi-gcc (GCC) 13.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231031/202310311025.kdFXiVKx-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202310311025.kdFXiVKx-lkp@intel.com/ All errors (new ones prefixed by >>): arm-linux-gnueabi-ld: fs/nfsd/nfsctl.o: in function `write_unlock_fs': >> fs/nfsd/nfsctl.c:283:(.text+0xa58): undefined reference to `nfsd4_revoke_states' vim +283 fs/nfsd/nfsctl.c 237 238 /* 239 * write_unlock_fs - Release all locks on a local file system 240 * 241 * Experimental. 242 * 243 * Input: 244 * buf: '\n'-terminated C string containing the 245 * absolute pathname of a local file system 246 * size: length of C string in @buf 247 * Output: 248 * On success: returns zero if all specified locks were released; 249 * returns one if one or more locks were not released 250 * On error: return code is negative errno value 251 */ 252 static ssize_t write_unlock_fs(struct file *file, char *buf, size_t size) 253 { 254 struct path path; 255 char *fo_path; 256 int error; 257 258 /* sanity check */ 259 if (size == 0) 260 return -EINVAL; 261 262 if (buf[size-1] != '\n') 263 return -EINVAL; 264 265 fo_path = buf; 266 if (qword_get(&buf, fo_path, size) < 0) 267 return -EINVAL; 268 trace_nfsd_ctl_unlock_fs(netns(file), fo_path); 269 error = kern_path(fo_path, 0, &path); 270 if (error) 271 return error; 272 273 /* 274 * XXX: Needs better sanity checking. Otherwise we could end up 275 * releasing locks on the wrong file system. 276 * 277 * For example: 278 * 1. Does the path refer to a directory? 279 * 2. Is that directory a mount point, or 280 * 3. Is that directory the root of an exported file system? 281 */ 282 error = nlmsvc_unlock_all_by_sb(path.dentry->d_sb); > 283 nfsd4_revoke_states(netns(file), path.dentry->d_sb); 284 285 path_put(&path); 286 return error; 287 } 288 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki