[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202109110654.QMc9RmpO-lkp@intel.com>
Date: Sat, 11 Sep 2021 06:15:12 +0800
From: kernel test robot <lkp@...el.com>
To: Eric Biggers <ebiggers@...gle.com>
Cc: llvm@...ts.linux.dev, kbuild-all@...ts.01.org,
linux-kernel@...r.kernel.org
Subject: [ebiggers:wip-blk-crypto-cleanup 5/6] block/blk-integrity.c:412:19:
error: no member named 'ksm' in 'struct request_queue'
tree: https://git.kernel.org/pub/scm/linux/kernel/git/ebiggers/linux.git wip-blk-crypto-cleanup
head: 830b1ca866c2329b3f40b5910adab46823c27ccf
commit: 74a73f1cda07f0e35eecd61ce405a8c5c05ef19a [5/6] blk-crypto: rename blk_keyslot_manager to blk_crypto_profile
config: arm-buildonly-randconfig-r001-20210910 (attached as .config)
compiler: clang version 14.0.0 (https://github.com/llvm/llvm-project 261cbe98c38f8c1ee1a482fe76511110e790f58a)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install arm cross compiling tool for clang build
# apt-get install binutils-arm-linux-gnueabi
# https://git.kernel.org/pub/scm/linux/kernel/git/ebiggers/linux.git/commit/?id=74a73f1cda07f0e35eecd61ce405a8c5c05ef19a
git remote add ebiggers https://git.kernel.org/pub/scm/linux/kernel/git/ebiggers/linux.git
git fetch --no-tags ebiggers wip-blk-crypto-cleanup
git checkout 74a73f1cda07f0e35eecd61ce405a8c5c05ef19a
# save the attached .config to linux build tree
mkdir build_dir
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross O=build_dir ARCH=arm SHELL=/bin/bash
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@...el.com>
All errors (new ones prefixed by >>):
>> block/blk-integrity.c:412:19: error: no member named 'ksm' in 'struct request_queue'
if (disk->queue->ksm) {
~~~~~~~~~~~ ^
>> block/blk-integrity.c:414:3: error: implicit declaration of function 'blk_ksm_unregister' [-Werror,-Wimplicit-function-declaration]
blk_ksm_unregister(disk->queue);
^
2 errors generated.
vim +412 block/blk-integrity.c
4125a09b0a0d57 Dan Williams 2015-10-21 385
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 386 /**
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 387 * blk_integrity_register - Register a gendisk as being integrity-capable
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 388 * @disk: struct gendisk pointer to make integrity-aware
25520d55cdb6ee Martin K. Petersen 2015-10-21 389 * @template: block integrity profile to register
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 390 *
25520d55cdb6ee Martin K. Petersen 2015-10-21 391 * Description: When a device needs to advertise itself as being able to
25520d55cdb6ee Martin K. Petersen 2015-10-21 392 * send/receive integrity metadata it must use this function to register
25520d55cdb6ee Martin K. Petersen 2015-10-21 393 * the capability with the block layer. The template is a blk_integrity
25520d55cdb6ee Martin K. Petersen 2015-10-21 394 * struct with values appropriate for the underlying hardware. See
898bd37a92063e Mauro Carvalho Chehab 2019-04-18 395 * Documentation/block/data-integrity.rst.
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 396 */
25520d55cdb6ee Martin K. Petersen 2015-10-21 397 void blk_integrity_register(struct gendisk *disk, struct blk_integrity *template)
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 398 {
ac6fc48c9fb7d3 Dan Williams 2015-10-21 399 struct blk_integrity *bi = &disk->queue->integrity;
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 400
25520d55cdb6ee Martin K. Petersen 2015-10-21 401 bi->flags = BLK_INTEGRITY_VERIFY | BLK_INTEGRITY_GENERATE |
25520d55cdb6ee Martin K. Petersen 2015-10-21 402 template->flags;
2859323e35ab5f Mike Snitzer 2017-04-22 403 bi->interval_exp = template->interval_exp ? :
2859323e35ab5f Mike Snitzer 2017-04-22 404 ilog2(queue_logical_block_size(disk->queue));
4125a09b0a0d57 Dan Williams 2015-10-21 405 bi->profile = template->profile ? template->profile : &nop_profile;
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 406 bi->tuple_size = template->tuple_size;
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 407 bi->tag_size = template->tag_size;
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 408
1cb039f3dc1619 Christoph Hellwig 2020-09-24 409 blk_queue_flag_set(QUEUE_FLAG_STABLE_WRITES, disk->queue);
d145dc23030bbf Satya Tangirala 2020-05-14 410
d145dc23030bbf Satya Tangirala 2020-05-14 411 #ifdef CONFIG_BLK_INLINE_ENCRYPTION
d145dc23030bbf Satya Tangirala 2020-05-14 @412 if (disk->queue->ksm) {
d145dc23030bbf Satya Tangirala 2020-05-14 413 pr_warn("blk-integrity: Integrity and hardware inline encryption are not supported together. Disabling hardware inline encryption.\n");
d145dc23030bbf Satya Tangirala 2020-05-14 @414 blk_ksm_unregister(disk->queue);
d145dc23030bbf Satya Tangirala 2020-05-14 415 }
d145dc23030bbf Satya Tangirala 2020-05-14 416 #endif
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 417 }
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 418 EXPORT_SYMBOL(blk_integrity_register);
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 419
:::::: The code at line 412 was first introduced by commit
:::::: d145dc23030bbf2de3a8ca5e0c29c2e568f69737 block: Make blk-integrity preclude hardware inline encryption
:::::: TO: Satya Tangirala <satyat@...gle.com>
:::::: CC: Jens Axboe <axboe@...nel.dk>
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org
Download attachment ".config.gz" of type "application/gzip" (29338 bytes)
Powered by blists - more mailing lists