lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <202411140553.K9M15p3F-lkp@intel.com>
Date: Thu, 14 Nov 2024 06:08:09 +0800
From: kernel test robot <lkp@...el.com>
To: yongli-oc <yongli-oc@...oxin.com>, akpm@...ux-foundation.org,
	linux-kernel@...r.kernel.org
Cc: oe-kbuild-all@...ts.linux.dev, yongli@...oxin.com, cobechen@...oxin.com,
	louisqi@...oxin.com, jiangbowang@...oxin.com
Subject: Re: [PATCH] Support lockref reference count if enable LOCK_STAT

Hi yongli-oc,

kernel test robot noticed the following build warnings:

[auto build test WARNING on akpm-mm/mm-everything]
[also build test WARNING on akpm-mm/mm-nonmm-unstable linus/master v6.12-rc7 next-20241113]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch#_base_tree_information]

url:    https://github.com/intel-lab-lkp/linux/commits/yongli-oc/Support-lockref-reference-count-if-enable-LOCK_STAT/20241113-171348
base:   https://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm.git mm-everything
patch link:    https://lore.kernel.org/r/20241113085703.148839-1-yongli-oc%40zhaoxin.com
patch subject: [PATCH] Support lockref reference count if enable LOCK_STAT
config: s390-allyesconfig (https://download.01.org/0day-ci/archive/20241114/202411140553.K9M15p3F-lkp@intel.com/config)
compiler: s390-linux-gcc (GCC) 14.2.0
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20241114/202411140553.K9M15p3F-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202411140553.K9M15p3F-lkp@intel.com/

All warnings (new ones prefixed by >>):

   In file included from include/linux/fs.h:8,
                    from include/linux/huge_mm.h:7,
                    from include/linux/mm.h:1120,
                    from include/linux/pid_namespace.h:7,
                    from include/linux/ptrace.h:10,
                    from include/linux/elfcore.h:11,
                    from include/linux/vmcore_info.h:6,
                    from include/linux/kexec.h:18,
                    from arch/s390/purgatory/purgatory.c:10:
   include/linux/dcache.h: In function 'dont_mount':
>> include/linux/dcache.h:369:19: warning: taking address of packed member of 'struct <anonymous>' may result in an unaligned pointer value [-Waddress-of-packed-member]
     369 |         spin_lock(&dentry->d_lock);
         |                   ^
   include/linux/dcache.h:371:21: warning: taking address of packed member of 'struct <anonymous>' may result in an unaligned pointer value [-Waddress-of-packed-member]
     371 |         spin_unlock(&dentry->d_lock);
         |                     ^


vim +369 include/linux/dcache.h

d83c49f3e36cec Al Viro 2010-04-30  366  
d83c49f3e36cec Al Viro 2010-04-30  367  static inline void dont_mount(struct dentry *dentry)
d83c49f3e36cec Al Viro 2010-04-30  368  {
d83c49f3e36cec Al Viro 2010-04-30 @369  	spin_lock(&dentry->d_lock);
d83c49f3e36cec Al Viro 2010-04-30  370  	dentry->d_flags |= DCACHE_CANT_MOUNT;
d83c49f3e36cec Al Viro 2010-04-30  371  	spin_unlock(&dentry->d_lock);
d83c49f3e36cec Al Viro 2010-04-30  372  }
d83c49f3e36cec Al Viro 2010-04-30  373  

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ