lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202201080319.dgPwSoQr-lkp@intel.com>
Date:   Sat, 8 Jan 2022 04:08:53 +0800
From:   kernel test robot <lkp@...el.com>
To:     Andrey Konovalov <andreyknvl@...gle.com>
Cc:     kbuild-all@...ts.01.org, linux-kernel@...r.kernel.org,
        Alistair Delva <adelva@...gle.com>,
        Vincenzo Frascino <vincenzo.frascino@....com>,
        Valdis Kletnieks <valdis.kletnieks@...edu>,
        Marco Elver <elver@...gle.com>,
        Alexander Potapenko <glider@...gle.com>,
        Andrew Morton <akpm@...ux-foundation.org>,
        Linux Memory Management List <linux-mm@...ck.org>
Subject: [ammarfaizi2-block:google/android/kernel/common/android12-5.10-m2107
 1559/8698] arch/s390/mm/kasan_init.c:419:13: warning: no previous prototype
 for 'kasan_copy_shadow'

Hi Andrey,

FYI, the error/warning still remains.

tree:   https://github.com/ammarfaizi2/linux-block google/android/kernel/common/android12-5.10-m2107
head:   6b5101a5720784d91a53168bfbc90c940ee6817f
commit: f4fb11566b5eb19aa91f674123a365854ab1470f [1559/8698] UPSTREAM: kasan: shadow declarations only for software modes
config: s390-allyesconfig (https://download.01.org/0day-ci/archive/20220108/202201080319.dgPwSoQr-lkp@intel.com/config)
compiler: s390-linux-gcc (GCC) 11.2.0
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # https://github.com/ammarfaizi2/linux-block/commit/f4fb11566b5eb19aa91f674123a365854ab1470f
        git remote add ammarfaizi2-block https://github.com/ammarfaizi2/linux-block
        git fetch --no-tags ammarfaizi2-block google/android/kernel/common/android12-5.10-m2107
        git checkout f4fb11566b5eb19aa91f674123a365854ab1470f
        # save the config file to linux build tree
        mkdir build_dir
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-11.2.0 make.cross O=build_dir ARCH=s390 SHELL=/bin/bash arch/s390/mm/ lib/

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@...el.com>

All warnings (new ones prefixed by >>):

   In file included from include/linux/kasan.h:15,
                    from arch/s390/mm/kasan_init.c:2:
   arch/s390/include/asm/kasan.h:20:31: error: unknown type name 'pgd_t'; did you mean 'pid_t'?
      20 | extern void kasan_copy_shadow(pgd_t *dst);
         |                               ^~~~~
         |                               pid_t
>> arch/s390/mm/kasan_init.c:419:13: warning: no previous prototype for 'kasan_copy_shadow' [-Wmissing-prototypes]
     419 | void __init kasan_copy_shadow(pgd_t *pg_dir)
         |             ^~~~~~~~~~~~~~~~~

Kconfig warnings: (for reference only)
   WARNING: unmet direct dependencies detected for WIRELESS_EXT
   Depends on NET && WIRELESS
   Selected by
   - GKI_LEGACY_WEXT_ALLCONFIG
   WARNING: unmet direct dependencies detected for WEXT_CORE
   Depends on NET && WIRELESS && (CFG80211_WEXT || WIRELESS_EXT
   Selected by
   - GKI_LEGACY_WEXT_ALLCONFIG
   WARNING: unmet direct dependencies detected for WEXT_PROC
   Depends on NET && WIRELESS && PROC_FS && WEXT_CORE
   Selected by
   - GKI_LEGACY_WEXT_ALLCONFIG
   WARNING: unmet direct dependencies detected for WEXT_PRIV
   Depends on NET && WIRELESS
   Selected by
   - GKI_LEGACY_WEXT_ALLCONFIG
   WARNING: unmet direct dependencies detected for WEXT_SPY
   Depends on NET && WIRELESS
   Selected by
   - GKI_LEGACY_WEXT_ALLCONFIG


vim +/kasan_copy_shadow +419 arch/s390/mm/kasan_init.c

42db5ed86090d8 Vasily Gorbik 2017-11-17  418  
42db5ed86090d8 Vasily Gorbik 2017-11-17 @419  void __init kasan_copy_shadow(pgd_t *pg_dir)
42db5ed86090d8 Vasily Gorbik 2017-11-17  420  {
42db5ed86090d8 Vasily Gorbik 2017-11-17  421  	/*
42db5ed86090d8 Vasily Gorbik 2017-11-17  422  	 * At this point we are still running on early pages setup early_pg_dir,
42db5ed86090d8 Vasily Gorbik 2017-11-17  423  	 * while swapper_pg_dir has just been initialized with identity mapping.
42db5ed86090d8 Vasily Gorbik 2017-11-17  424  	 * Carry over shadow memory region from early_pg_dir to swapper_pg_dir.
42db5ed86090d8 Vasily Gorbik 2017-11-17  425  	 */
42db5ed86090d8 Vasily Gorbik 2017-11-17  426  
42db5ed86090d8 Vasily Gorbik 2017-11-17  427  	pgd_t *pg_dir_src;
42db5ed86090d8 Vasily Gorbik 2017-11-17  428  	pgd_t *pg_dir_dst;
42db5ed86090d8 Vasily Gorbik 2017-11-17  429  	p4d_t *p4_dir_src;
42db5ed86090d8 Vasily Gorbik 2017-11-17  430  	p4d_t *p4_dir_dst;
42db5ed86090d8 Vasily Gorbik 2017-11-17  431  	pud_t *pu_dir_src;
42db5ed86090d8 Vasily Gorbik 2017-11-17  432  	pud_t *pu_dir_dst;
42db5ed86090d8 Vasily Gorbik 2017-11-17  433  
42db5ed86090d8 Vasily Gorbik 2017-11-17  434  	pg_dir_src = pgd_offset_raw(early_pg_dir, KASAN_SHADOW_START);
42db5ed86090d8 Vasily Gorbik 2017-11-17  435  	pg_dir_dst = pgd_offset_raw(pg_dir, KASAN_SHADOW_START);
42db5ed86090d8 Vasily Gorbik 2017-11-17  436  	p4_dir_src = p4d_offset(pg_dir_src, KASAN_SHADOW_START);
42db5ed86090d8 Vasily Gorbik 2017-11-17  437  	p4_dir_dst = p4d_offset(pg_dir_dst, KASAN_SHADOW_START);
42db5ed86090d8 Vasily Gorbik 2017-11-17  438  	if (!p4d_folded(*p4_dir_src)) {
42db5ed86090d8 Vasily Gorbik 2017-11-17  439  		/* 4 level paging */
42db5ed86090d8 Vasily Gorbik 2017-11-17  440  		memcpy(p4_dir_dst, p4_dir_src,
42db5ed86090d8 Vasily Gorbik 2017-11-17  441  		       (KASAN_SHADOW_SIZE >> P4D_SHIFT) * sizeof(p4d_t));
42db5ed86090d8 Vasily Gorbik 2017-11-17  442  		return;
42db5ed86090d8 Vasily Gorbik 2017-11-17  443  	}
42db5ed86090d8 Vasily Gorbik 2017-11-17  444  	/* 3 level paging */
42db5ed86090d8 Vasily Gorbik 2017-11-17  445  	pu_dir_src = pud_offset(p4_dir_src, KASAN_SHADOW_START);
42db5ed86090d8 Vasily Gorbik 2017-11-17  446  	pu_dir_dst = pud_offset(p4_dir_dst, KASAN_SHADOW_START);
42db5ed86090d8 Vasily Gorbik 2017-11-17  447  	memcpy(pu_dir_dst, pu_dir_src,
42db5ed86090d8 Vasily Gorbik 2017-11-17  448  	       (KASAN_SHADOW_SIZE >> PUD_SHIFT) * sizeof(pud_t));
42db5ed86090d8 Vasily Gorbik 2017-11-17  449  }
135ff163939294 Vasily Gorbik 2017-11-20  450  

:::::: The code at line 419 was first introduced by commit
:::::: 42db5ed86090d8e57ca08bfd162a10be6320cc49 s390/kasan: add initialization code and enable it

:::::: TO: Vasily Gorbik <gor@...ux.ibm.com>
:::::: CC: Martin Schwidefsky <schwidefsky@...ibm.com>

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ