tree:
https://git.kernel.org/pub/scm/linux/kernel/git/ebiggers/linux.git
wip-blk-crypto-cleanup
head: 830b1ca866c2329b3f40b5910adab46823c27ccf
commit: 74a73f1cda07f0e35eecd61ce405a8c5c05ef19a [5/6] blk-crypto: rename
blk_keyslot_manager to blk_crypto_profile
config: arm-buildonly-randconfig-r001-20210910 (attached as .config)
compiler: clang version 14.0.0 (
https://github.com/llvm/llvm-project
261cbe98c38f8c1ee1a482fe76511110e790f58a)
reproduce (this is a W=1 build):
wget
https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O
~/bin/make.cross
chmod +x ~/bin/make.cross
# install arm cross compiling tool for clang build
# apt-get install binutils-arm-linux-gnueabi
#
https://git.kernel.org/pub/scm/linux/kernel/git/ebiggers/linux.git/commit...
git remote add ebiggers
https://git.kernel.org/pub/scm/linux/kernel/git/ebiggers/linux.git
git fetch --no-tags ebiggers wip-blk-crypto-cleanup
git checkout 74a73f1cda07f0e35eecd61ce405a8c5c05ef19a
# save the attached .config to linux build tree
mkdir build_dir
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross O=build_dir ARCH=arm
SHELL=/bin/bash
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp(a)intel.com>
All errors (new ones prefixed by >>):
> block/blk-integrity.c:412:19: error: no member named
'ksm' in 'struct request_queue'
if
(disk->queue->ksm) {
~~~~~~~~~~~ ^
> block/blk-integrity.c:414:3: error: implicit declaration of
function 'blk_ksm_unregister' [-Werror,-Wimplicit-function-declaration]
blk_ksm_unregister(disk->queue);
^
2 errors generated.
vim +412 block/blk-integrity.c
4125a09b0a0d57 Dan Williams 2015-10-21 385
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 386 /**
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 387 * blk_integrity_register - Register
a gendisk as being integrity-capable
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 388 * @disk: struct gendisk pointer to
make integrity-aware
25520d55cdb6ee Martin K. Petersen 2015-10-21 389 * @template: block integrity
profile to register
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 390 *
25520d55cdb6ee Martin K. Petersen 2015-10-21 391 * Description: When a device needs
to advertise itself as being able to
25520d55cdb6ee Martin K. Petersen 2015-10-21 392 * send/receive integrity metadata
it must use this function to register
25520d55cdb6ee Martin K. Petersen 2015-10-21 393 * the capability with the block
layer. The template is a blk_integrity
25520d55cdb6ee Martin K. Petersen 2015-10-21 394 * struct with values appropriate
for the underlying hardware. See
898bd37a92063e Mauro Carvalho Chehab 2019-04-18 395 *
Documentation/block/data-integrity.rst.
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 396 */
25520d55cdb6ee Martin K. Petersen 2015-10-21 397 void blk_integrity_register(struct
gendisk *disk, struct blk_integrity *template)
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 398 {
ac6fc48c9fb7d3 Dan Williams 2015-10-21 399 struct blk_integrity *bi =
&disk->queue->integrity;
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 400
25520d55cdb6ee Martin K. Petersen 2015-10-21 401 bi->flags = BLK_INTEGRITY_VERIFY
| BLK_INTEGRITY_GENERATE |
25520d55cdb6ee Martin K. Petersen 2015-10-21 402 template->flags;
2859323e35ab5f Mike Snitzer 2017-04-22 403 bi->interval_exp =
template->interval_exp ? :
2859323e35ab5f Mike Snitzer 2017-04-22 404
ilog2(queue_logical_block_size(disk->queue));
4125a09b0a0d57 Dan Williams 2015-10-21 405 bi->profile =
template->profile ? template->profile : &nop_profile;
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 406 bi->tuple_size =
template->tuple_size;
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 407 bi->tag_size =
template->tag_size;
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 408
1cb039f3dc1619 Christoph Hellwig 2020-09-24 409
blk_queue_flag_set(QUEUE_FLAG_STABLE_WRITES, disk->queue);
d145dc23030bbf Satya Tangirala 2020-05-14 410
d145dc23030bbf Satya Tangirala 2020-05-14 411 #ifdef CONFIG_BLK_INLINE_ENCRYPTION
d145dc23030bbf Satya Tangirala 2020-05-14 @412 if (disk->queue->ksm) {
d145dc23030bbf Satya Tangirala 2020-05-14 413 pr_warn("blk-integrity:
Integrity and hardware inline encryption are not supported together. Disabling hardware
inline encryption.\n");
d145dc23030bbf Satya Tangirala 2020-05-14 @414
blk_ksm_unregister(disk->queue);
d145dc23030bbf Satya Tangirala 2020-05-14 415 }
d145dc23030bbf Satya Tangirala 2020-05-14 416 #endif
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 417 }
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 418
EXPORT_SYMBOL(blk_integrity_register);
7ba1ba12eeef0a Martin K. Petersen 2008-06-30 419
:::::: The code at line 412 was first introduced by commit
:::::: d145dc23030bbf2de3a8ca5e0c29c2e568f69737 block: Make blk-integrity preclude
hardware inline encryption
:::::: TO: Satya Tangirala <satyat(a)google.com>
:::::: CC: Jens Axboe <axboe(a)kernel.dk>
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org