lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Wed, 7 Jun 2017 08:54:14 +0800
From:   kbuild test robot <fengguang.wu@...el.com>
To:     Peter Zijlstra <peterz@...radead.org>
Cc:     kbuild-all@...org, linux-kernel@...r.kernel.org,
        Laurent Dufour <ldufour@...ux.vnet.ibm.com>
Subject: [rcu:spf 6/20] mm/memory.c:3967:19: error: passing argument 1 of
 'pud_offset' from incompatible pointer type

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/paulmck/linux-rcu.git spf
head:   763f66834bf1d9c6ec6f7e7f8a9c07f5ff44c631
commit: 708f84e40c5ee0d0c2ef6c3abe11004bc6042784 [6/20] mm: Provide speculative fault infrastructure
config: x86_64-randconfig-x019-201723 (attached as .config)
compiler: gcc-6 (Debian 6.2.0-3) 6.2.0 20160901
reproduce:
        git checkout 708f84e40c5ee0d0c2ef6c3abe11004bc6042784
        # save the attached .config to linux build tree
        make ARCH=x86_64 

Note: the rcu/spf HEAD 763f66834bf1d9c6ec6f7e7f8a9c07f5ff44c631 builds fine.
      It only hurts bisectibility.

All errors (new ones prefixed by >>):

   mm/memory.c: In function 'handle_speculative_fault':
>> mm/memory.c:3967:19: error: passing argument 1 of 'pud_offset' from incompatible pointer type [-Werror=incompatible-pointer-types]
     pud = pud_offset(pgd, address);
                      ^~~
   In file included from include/linux/mm.h:70:0,
                    from mm/memory.c:42:
   arch/x86/include/asm/pgtable.h:826:22: note: expected 'p4d_t * {aka struct <anonymous> *}' but argument is of type 'pgd_t * {aka struct <anonymous> *}'
    static inline pud_t *pud_offset(p4d_t *p4d, unsigned long address)
                         ^~~~~~~~~~
   cc1: some warnings being treated as errors

vim +/pud_offset +3967 mm/memory.c

  3961		 */
  3962		local_irq_disable();
  3963		pgd = pgd_offset(mm, address);
  3964		if (pgd_none(*pgd) || unlikely(pgd_bad(*pgd)))
  3965			goto out_walk;
  3966	
> 3967		pud = pud_offset(pgd, address);
  3968		if (pud_none(*pud) || unlikely(pud_bad(*pud)))
  3969			goto out_walk;
  3970	

---
0-DAY kernel test infrastructure                Open Source Technology Center
https://lists.01.org/pipermail/kbuild-all                   Intel Corporation

Download attachment ".config.gz" of type "application/gzip" (31747 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ