lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202203100753.ca2Tl49i-lkp@intel.com>
Date:   Thu, 10 Mar 2022 07:23:29 +0800
From:   kernel test robot <lkp@...el.com>
To:     Jiri Olsa <jolsa@...nel.org>
Cc:     kbuild-all@...ts.01.org, linux-kernel@...r.kernel.org,
        Masami Hiramatsu <mhiramat@...nel.org>
Subject: [jolsa-perf:bpf/kprobe_multi_4 3/11]
 include/linux/trace_events.h:784:42: warning: 'union bpf_attr' declared
 inside parameter list will not be visible outside of this definition or
 declaration

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/jolsa/perf.git bpf/kprobe_multi_4
head:   02731d567ee31d7c7f012e9c5930f114ed1e2478
commit: c330e21ba4633cb075ce0c4c5f936b16ed722666 [3/11] bpf: Add multi kprobe link
config: arm-buildonly-randconfig-r003-20220309 (https://download.01.org/0day-ci/archive/20220310/202203100753.ca2Tl49i-lkp@intel.com/config)
compiler: arm-linux-gnueabi-gcc (GCC) 11.2.0
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # https://git.kernel.org/pub/scm/linux/kernel/git/jolsa/perf.git/commit/?id=c330e21ba4633cb075ce0c4c5f936b16ed722666
        git remote add jolsa-perf https://git.kernel.org/pub/scm/linux/kernel/git/jolsa/perf.git
        git fetch --no-tags jolsa-perf bpf/kprobe_multi_4
        git checkout c330e21ba4633cb075ce0c4c5f936b16ed722666
        # save the config file to linux build tree
        mkdir build_dir
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-11.2.0 make.cross O=build_dir ARCH=arm SHELL=/bin/bash drivers/usb/typec/tipd/

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@...el.com>

All warnings (new ones prefixed by >>):

   In file included from include/trace/trace_events.h:21,
                    from include/trace/define_trace.h:102,
                    from drivers/usb/typec/tipd/trace.h:306,
                    from drivers/usb/typec/tipd/trace.c:9:
>> include/linux/trace_events.h:784:42: warning: 'union bpf_attr' declared inside parameter list will not be visible outside of this definition or declaration
     784 | bpf_kprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog)
         |                                          ^~~~~~~~


vim +784 include/linux/trace_events.h

   755	
   756	static inline int
   757	perf_event_query_prog_array(struct perf_event *event, void __user *info)
   758	{
   759		return -EOPNOTSUPP;
   760	}
   761	static inline int bpf_probe_register(struct bpf_raw_event_map *btp, struct bpf_prog *p)
   762	{
   763		return -EOPNOTSUPP;
   764	}
   765	static inline int bpf_probe_unregister(struct bpf_raw_event_map *btp, struct bpf_prog *p)
   766	{
   767		return -EOPNOTSUPP;
   768	}
   769	static inline struct bpf_raw_event_map *bpf_get_raw_tracepoint(const char *name)
   770	{
   771		return NULL;
   772	}
   773	static inline void bpf_put_raw_tracepoint(struct bpf_raw_event_map *btp)
   774	{
   775	}
   776	static inline int bpf_get_perf_event_info(const struct perf_event *event,
   777						  u32 *prog_id, u32 *fd_type,
   778						  const char **buf, u64 *probe_offset,
   779						  u64 *probe_addr)
   780	{
   781		return -EOPNOTSUPP;
   782	}
   783	static inline int
 > 784	bpf_kprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog)
   785	{
   786		return -EOPNOTSUPP;
   787	}
   788	#endif
   789	

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ