lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <202505251836.qXs81x9F-lkp@intel.com>
Date: Sun, 25 May 2025 19:14:52 +0800
From: kernel test robot <lkp@...el.com>
To: xur@...gle.com, Masahiro Yamada <masahiroy@...nel.org>,
	Nathan Chancellor <nathan@...nel.org>,
	Eric Naim <dnaim@...hyos.org>,
	Nicolas Schier <nicolas.schier@...ux.dev>,
	Nick Desaulniers <nick.desaulniers+lkml@...il.com>,
	Bill Wendling <morbo@...gle.com>,
	Justin Stitt <justinstitt@...gle.com>,
	Miguel Ojeda <ojeda@...nel.org>,
	Thomas Gleixner <tglx@...utronix.de>,
	Alice Ryhl <aliceryhl@...gle.com>,
	Sami Tolvanen <samitolvanen@...gle.com>,
	"Mike Rapoport (Microsoft)" <rppt@...nel.org>,
	Rafael Aquini <aquini@...hat.com>,
	Michael Ellerman <mpe@...erman.id.au>,
	Stafford Horne <shorne@...il.com>,
	Christophe Leroy <christophe.leroy@...roup.eu>,
	Teresa Johnson <tejohnson@...gle.com>
Cc: oe-kbuild-all@...ts.linux.dev, linux-kernel@...r.kernel.org,
	linux-kbuild@...r.kernel.org, llvm@...ts.linux.dev
Subject: Re: [PATCH v3] kbuild: distributed build support for Clang ThinLTO

Hi,

kernel test robot noticed the following build warnings:

[auto build test WARNING on masahiroy-kbuild/for-next]
[also build test WARNING on masahiroy-kbuild/fixes linus/master v6.15-rc7 next-20250523]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch#_base_tree_information]

url:    https://github.com/intel-lab-lkp/linux/commits/xur-google-com/kbuild-distributed-build-support-for-Clang-ThinLTO/20250522-053726
base:   https://git.kernel.org/pub/scm/linux/kernel/git/masahiroy/linux-kbuild.git for-next
patch link:    https://lore.kernel.org/r/20250521213534.3159514-1-xur%40google.com
patch subject: [PATCH v3] kbuild: distributed build support for Clang ThinLTO
config: arm64-randconfig-r131-20250525 (https://download.01.org/0day-ci/archive/20250525/202505251836.qXs81x9F-lkp@intel.com/config)
compiler: clang version 21.0.0git (https://github.com/llvm/llvm-project f819f46284f2a79790038e1f6649172789734ae8)
reproduce: (https://download.01.org/0day-ci/archive/20250525/202505251836.qXs81x9F-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202505251836.qXs81x9F-lkp@intel.com/

sparse warnings: (new ones prefixed by >>)
>> mm/sparse-vmemmap.c:442:21: sparse: sparse: cast to non-scalar
>> mm/sparse-vmemmap.c:442:21: sparse: sparse: cast from non-scalar
   mm/sparse-vmemmap.c: note: in included file (through include/linux/pgtable.h, include/linux/mm.h):
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast to non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast from non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast to non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast from non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast to non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast from non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast to non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast from non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast to non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast from non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast to non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast from non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast to non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast from non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast to non-scalar
   arch/arm64/include/asm/pgtable.h:339:16: sparse: sparse: cast from non-scalar

vim +442 mm/sparse-vmemmap.c

2045a3b8911b6e Feiyang Chen 2022-10-27  415  
2045a3b8911b6e Feiyang Chen 2022-10-27  416  int __meminit vmemmap_populate_hugepages(unsigned long start, unsigned long end,
2045a3b8911b6e Feiyang Chen 2022-10-27  417  					 int node, struct vmem_altmap *altmap)
2045a3b8911b6e Feiyang Chen 2022-10-27  418  {
2045a3b8911b6e Feiyang Chen 2022-10-27  419  	unsigned long addr;
2045a3b8911b6e Feiyang Chen 2022-10-27  420  	unsigned long next;
2045a3b8911b6e Feiyang Chen 2022-10-27  421  	pgd_t *pgd;
2045a3b8911b6e Feiyang Chen 2022-10-27  422  	p4d_t *p4d;
2045a3b8911b6e Feiyang Chen 2022-10-27  423  	pud_t *pud;
2045a3b8911b6e Feiyang Chen 2022-10-27  424  	pmd_t *pmd;
2045a3b8911b6e Feiyang Chen 2022-10-27  425  
2045a3b8911b6e Feiyang Chen 2022-10-27  426  	for (addr = start; addr < end; addr = next) {
2045a3b8911b6e Feiyang Chen 2022-10-27  427  		next = pmd_addr_end(addr, end);
2045a3b8911b6e Feiyang Chen 2022-10-27  428  
2045a3b8911b6e Feiyang Chen 2022-10-27  429  		pgd = vmemmap_pgd_populate(addr, node);
2045a3b8911b6e Feiyang Chen 2022-10-27  430  		if (!pgd)
2045a3b8911b6e Feiyang Chen 2022-10-27  431  			return -ENOMEM;
2045a3b8911b6e Feiyang Chen 2022-10-27  432  
2045a3b8911b6e Feiyang Chen 2022-10-27  433  		p4d = vmemmap_p4d_populate(pgd, addr, node);
2045a3b8911b6e Feiyang Chen 2022-10-27  434  		if (!p4d)
2045a3b8911b6e Feiyang Chen 2022-10-27  435  			return -ENOMEM;
2045a3b8911b6e Feiyang Chen 2022-10-27  436  
2045a3b8911b6e Feiyang Chen 2022-10-27  437  		pud = vmemmap_pud_populate(p4d, addr, node);
2045a3b8911b6e Feiyang Chen 2022-10-27  438  		if (!pud)
2045a3b8911b6e Feiyang Chen 2022-10-27  439  			return -ENOMEM;
2045a3b8911b6e Feiyang Chen 2022-10-27  440  
2045a3b8911b6e Feiyang Chen 2022-10-27  441  		pmd = pmd_offset(pud, addr);
2045a3b8911b6e Feiyang Chen 2022-10-27 @442  		if (pmd_none(READ_ONCE(*pmd))) {
2045a3b8911b6e Feiyang Chen 2022-10-27  443  			void *p;
2045a3b8911b6e Feiyang Chen 2022-10-27  444  
2045a3b8911b6e Feiyang Chen 2022-10-27  445  			p = vmemmap_alloc_block_buf(PMD_SIZE, node, altmap);
2045a3b8911b6e Feiyang Chen 2022-10-27  446  			if (p) {
2045a3b8911b6e Feiyang Chen 2022-10-27  447  				vmemmap_set_pmd(pmd, p, node, addr, next);
2045a3b8911b6e Feiyang Chen 2022-10-27  448  				continue;
2045a3b8911b6e Feiyang Chen 2022-10-27  449  			} else if (altmap) {
2045a3b8911b6e Feiyang Chen 2022-10-27  450  				/*
2045a3b8911b6e Feiyang Chen 2022-10-27  451  				 * No fallback: In any case we care about, the
2045a3b8911b6e Feiyang Chen 2022-10-27  452  				 * altmap should be reasonably sized and aligned
2045a3b8911b6e Feiyang Chen 2022-10-27  453  				 * such that vmemmap_alloc_block_buf() will always
2045a3b8911b6e Feiyang Chen 2022-10-27  454  				 * succeed. For consistency with the PTE case,
2045a3b8911b6e Feiyang Chen 2022-10-27  455  				 * return an error here as failure could indicate
2045a3b8911b6e Feiyang Chen 2022-10-27  456  				 * a configuration issue with the size of the altmap.
2045a3b8911b6e Feiyang Chen 2022-10-27  457  				 */
2045a3b8911b6e Feiyang Chen 2022-10-27  458  				return -ENOMEM;
2045a3b8911b6e Feiyang Chen 2022-10-27  459  			}
2045a3b8911b6e Feiyang Chen 2022-10-27  460  		} else if (vmemmap_check_pmd(pmd, node, addr, next))
2045a3b8911b6e Feiyang Chen 2022-10-27  461  			continue;
2045a3b8911b6e Feiyang Chen 2022-10-27  462  		if (vmemmap_populate_basepages(addr, next, node, altmap))
2045a3b8911b6e Feiyang Chen 2022-10-27  463  			return -ENOMEM;
2045a3b8911b6e Feiyang Chen 2022-10-27  464  	}
2045a3b8911b6e Feiyang Chen 2022-10-27  465  	return 0;
2045a3b8911b6e Feiyang Chen 2022-10-27  466  }
2045a3b8911b6e Feiyang Chen 2022-10-27  467  

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ