From: kbuild test robot <lkp@intel.com> To: Arnd Bergmann <arnd@arndb.de> Cc: kbuild-all@01.org, Andrey Ryabinin <aryabinin@virtuozzo.com>, David Laight <David.Laight@aculab.com>, Mauro Carvalho Chehab <mchehab@kernel.org>, "David S . Miller" <davem@davemloft.net>, Alexander Potapenko <glider@google.com>, Dmitry Vyukov <dvyukov@google.com>, Masahiro Yamada <yamada.masahiro@socionext.com>, Andrew Morton <akpm@linux-foundation.org>, Kees Cook <keescook@chromium.org>, Geert Uytterhoeven <geert@linux-m68k.org>, Greg Kroah-Hartman <gregkh@linuxfoundation.org>, "linux-media @ vger . kernel . org" <linux-media@vger.kernel.org>, "linux-kernel @ vger . kernel . org" <linux-kernel@vger.kernel.org>, "kasan-dev @ googlegroups . com" <kasan-dev@googlegroups.com>, "linux-kbuild @ vger . kernel . org" <linux-kbuild@vger.kernel.org>, Arnd Bergmann <arnd@arndb.de> Subject: Re: [PATCH] string.h: work around for increased stack usage Date: Wed, 4 Oct 2017 02:10:22 +0800 [thread overview] Message-ID: <201710040103.8bUbfu25%fengguang.wu@intel.com> (raw) In-Reply-To: <20171002084119.3504771-1-arnd@arndb.de> [-- Attachment #1: Type: text/plain, Size: 1529 bytes --] Hi Arnd, [auto build test ERROR on linus/master] [also build test ERROR on v4.14-rc3 next-20170929] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0day-ci/linux/commits/Arnd-Bergmann/string-h-work-around-for-increased-stack-usage/20171003-210611 config: x86_64-randconfig-ws0-10040032 (attached as .config) compiler: gcc-4.8 (Debian 4.8.4-1) 4.8.4 reproduce: # save the attached .config to linux build tree make ARCH=x86_64 All error/warnings (new ones prefixed by >>): In file included from lib/string.c:23:0: >> include/linux/string.h:235:2: error: expected identifier or '(' before 'do' do { \ ^ >> lib/string.c:1048:6: note: in expansion of macro 'fortify_panic' void fortify_panic(const char *name) ^ >> include/linux/string.h:238:4: error: expected identifier or '(' before 'while' } while (0) ^ >> lib/string.c:1048:6: note: in expansion of macro 'fortify_panic' void fortify_panic(const char *name) ^ vim +235 include/linux/string.h 231 232 /* work around GCC PR82365 */ 233 #if defined(CONFIG_KASAN) && !defined(__clang__) && GCC_VERSION <= 80000 234 #define fortify_panic(x) \ > 235 do { \ 236 asm volatile(""); \ 237 fortify_panic(x); \ > 238 } while (0) 239 #endif 240 --- 0-DAY kernel test infrastructure Open Source Technology Center https://lists.01.org/pipermail/kbuild-all Intel Corporation [-- Attachment #2: .config.gz --] [-- Type: application/gzip, Size: 32772 bytes --]
WARNING: multiple messages have this Message-ID (diff)
From: kbuild test robot <lkp@intel.com> To: Arnd Bergmann <arnd@arndb.de> Cc: kbuild-all@01.org, Andrey Ryabinin <aryabinin@virtuozzo.com>, David Laight <David.Laight@aculab.com>, Mauro Carvalho Chehab <mchehab@kernel.org>, "David S . Miller" <davem@davemloft.net>, Alexander Potapenko <glider@google.com>, Dmitry Vyukov <dvyukov@google.com>, Masahiro Yamada <yamada.masahiro@socionext.com>, Andrew Morton <akpm@linux-foundation.org>, Kees Cook <keescook@chromium.org>, Geert Uytterhoeven <geert@linux-m68k.org>, Greg Kroah-Hartman <gregkh@linuxfoundation.org>, "linux-media @ vger . kernel . org" <linux-media@vger.kernel.org>, "linux-kernel @ vger . kernel . org" <linux-kernel@vger.kernel.org>, "kasan-dev @ googlegroups . com" <kasan-dev@googlegroups.com>, "linux-kbuild @ vger . kernel . org" <linux-kbuild@vger.kernel.org> Subject: Re: [PATCH] string.h: work around for increased stack usage Date: Wed, 4 Oct 2017 02:10:22 +0800 [thread overview] Message-ID: <201710040103.8bUbfu25%fengguang.wu@intel.com> (raw) In-Reply-To: <20171002084119.3504771-1-arnd@arndb.de> [-- Attachment #1: Type: text/plain, Size: 1529 bytes --] Hi Arnd, [auto build test ERROR on linus/master] [also build test ERROR on v4.14-rc3 next-20170929] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0day-ci/linux/commits/Arnd-Bergmann/string-h-work-around-for-increased-stack-usage/20171003-210611 config: x86_64-randconfig-ws0-10040032 (attached as .config) compiler: gcc-4.8 (Debian 4.8.4-1) 4.8.4 reproduce: # save the attached .config to linux build tree make ARCH=x86_64 All error/warnings (new ones prefixed by >>): In file included from lib/string.c:23:0: >> include/linux/string.h:235:2: error: expected identifier or '(' before 'do' do { \ ^ >> lib/string.c:1048:6: note: in expansion of macro 'fortify_panic' void fortify_panic(const char *name) ^ >> include/linux/string.h:238:4: error: expected identifier or '(' before 'while' } while (0) ^ >> lib/string.c:1048:6: note: in expansion of macro 'fortify_panic' void fortify_panic(const char *name) ^ vim +235 include/linux/string.h 231 232 /* work around GCC PR82365 */ 233 #if defined(CONFIG_KASAN) && !defined(__clang__) && GCC_VERSION <= 80000 234 #define fortify_panic(x) \ > 235 do { \ 236 asm volatile(""); \ 237 fortify_panic(x); \ > 238 } while (0) 239 #endif 240 --- 0-DAY kernel test infrastructure Open Source Technology Center https://lists.01.org/pipermail/kbuild-all Intel Corporation [-- Attachment #2: .config.gz --] [-- Type: application/gzip, Size: 32772 bytes --]
next prev parent reply other threads:[~2017-10-03 18:11 UTC|newest] Thread overview: 58+ messages / expand[flat|nested] mbox.gz Atom feed top 2017-09-22 21:29 [PATCH v4 0/9] bring back stack frame warning with KASAN Arnd Bergmann 2017-09-22 21:29 ` Arnd Bergmann 2017-09-22 21:29 ` Arnd Bergmann 2017-09-22 21:29 ` Arnd Bergmann 2017-09-22 21:29 ` [PATCH v4 1/9] brcmsmac: make some local variables 'static const' to reduce stack size Arnd Bergmann 2017-09-22 21:29 ` Arnd Bergmann 2017-09-25 4:33 ` Kalle Valo 2017-09-25 4:33 ` Kalle Valo 2017-10-02 13:53 ` [v4, " Kalle Valo 2017-10-02 13:53 ` Kalle Valo 2017-10-02 13:53 ` Kalle Valo 2017-09-22 21:29 ` [PATCH v4 2/9] brcmsmac: split up wlc_phy_workarounds_nphy Arnd Bergmann 2017-09-22 21:29 ` Arnd Bergmann 2017-10-02 13:55 ` [v4,2/9] " Kalle Valo 2017-10-02 13:55 ` Kalle Valo 2017-10-02 13:55 ` Kalle Valo 2017-10-27 7:51 ` Kalle Valo 2017-10-27 7:51 ` Kalle Valo 2017-10-27 7:51 ` Kalle Valo 2017-09-22 21:29 ` [PATCH v4 3/9] brcmsmac: reindent split functions Arnd Bergmann 2017-09-22 21:29 ` Arnd Bergmann 2017-09-22 21:29 ` [PATCH v4 4/9] em28xx: fix em28xx_dvb_init for KASAN Arnd Bergmann 2017-09-22 21:29 ` Arnd Bergmann 2017-09-25 14:41 ` David Laight 2017-09-25 14:41 ` David Laight 2017-09-26 6:32 ` Arnd Bergmann 2017-09-26 6:32 ` Arnd Bergmann 2017-09-26 6:47 ` Arnd Bergmann 2017-09-26 6:47 ` Arnd Bergmann 2017-09-26 16:49 ` Andrey Ryabinin 2017-09-26 16:49 ` Andrey Ryabinin 2017-09-27 13:26 ` Arnd Bergmann 2017-09-27 13:26 ` Arnd Bergmann 2017-09-28 13:09 ` Andrey Ryabinin 2017-09-28 13:09 ` Andrey Ryabinin 2017-09-28 14:30 ` Arnd Bergmann 2017-09-28 14:30 ` Arnd Bergmann 2017-10-02 8:33 ` Arnd Bergmann 2017-10-02 8:33 ` Arnd Bergmann 2017-10-02 8:40 ` [PATCH] string.h: work around for increased stack usage Arnd Bergmann 2017-10-02 9:02 ` Arnd Bergmann 2017-10-02 14:07 ` Andrey Ryabinin 2017-10-03 18:10 ` kbuild test robot [this message] 2017-10-03 18:10 ` kbuild test robot 2017-09-22 21:29 ` [PATCH v4 5/9] r820t: fix r820t_write_reg for KASAN Arnd Bergmann 2017-09-22 21:29 ` Arnd Bergmann 2017-09-22 21:29 ` [PATCH v4 6/9] dvb-frontends: fix i2c access helpers " Arnd Bergmann 2017-09-22 21:29 ` Arnd Bergmann 2017-09-22 21:29 ` [PATCH v4 7/9] rocker: fix rocker_tlv_put_* functions " Arnd Bergmann 2017-09-22 21:29 ` Arnd Bergmann 2017-09-26 3:19 ` David Miller 2017-09-22 21:29 ` [PATCH v4 8/9] netlink: fix nla_put_{u8,u16,u32} " Arnd Bergmann 2017-09-22 21:29 ` Arnd Bergmann 2017-09-26 3:19 ` David Miller 2017-09-22 21:29 ` [PATCH v4 9/9] kasan: rework Kconfig settings Arnd Bergmann 2017-09-26 19:36 ` Andrey Ryabinin 2017-12-05 21:51 [PATCH] string.h: work around for increased stack usage Arnd Bergmann 2017-12-05 22:02 ` Andrew Morton
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=201710040103.8bUbfu25%fengguang.wu@intel.com \ --to=lkp@intel.com \ --cc=David.Laight@aculab.com \ --cc=akpm@linux-foundation.org \ --cc=arnd@arndb.de \ --cc=aryabinin@virtuozzo.com \ --cc=davem@davemloft.net \ --cc=dvyukov@google.com \ --cc=geert@linux-m68k.org \ --cc=glider@google.com \ --cc=gregkh@linuxfoundation.org \ --cc=kasan-dev@googlegroups.com \ --cc=kbuild-all@01.org \ --cc=keescook@chromium.org \ --cc=linux-kbuild@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-media@vger.kernel.org \ --cc=mchehab@kernel.org \ --cc=yamada.masahiro@socionext.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.