lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <202304041119.egH8ZcDT-lkp@intel.com> Date: Tue, 4 Apr 2023 11:44:17 +0800 From: kernel test robot <lkp@...el.com> To: Dmitry Safonov <dima@...sta.com>, linux-kernel@...r.kernel.org, David Ahern <dsahern@...nel.org>, Eric Dumazet <edumazet@...gle.com>, Paolo Abeni <pabeni@...hat.com>, Jakub Kicinski <kuba@...nel.org>, "David S. Miller" <davem@...emloft.net> Cc: oe-kbuild-all@...ts.linux.dev, netdev@...r.kernel.org, Dmitry Safonov <dima@...sta.com>, Andy Lutomirski <luto@...capital.net>, Ard Biesheuvel <ardb@...nel.org>, Bob Gilligan <gilligan@...sta.com>, Dan Carpenter <error27@...il.com>, David Laight <David.Laight@...lab.com>, Eric Biggers <ebiggers@...nel.org>, "Eric W. Biederman" <ebiederm@...ssion.com>, Francesco Ruggeri <fruggeri05@...il.com>, Herbert Xu <herbert@...dor.apana.org.au>, Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>, Ivan Delalande <colona@...sta.com>, Leonard Crestez <cdleonard@...il.com>, Salam Noureddine <noureddine@...sta.com> Subject: Re: [PATCH v5 01/21] [draft] net/tcp: Prepare tcp_md5sig_pool for TCP-AO Hi Dmitry, kernel test robot noticed the following build warnings: [auto build test WARNING on 7e364e56293bb98cae1b55fd835f5991c4e96e7d] url: https://github.com/intel-lab-lkp/linux/commits/Dmitry-Safonov/net-tcp-Prepare-tcp_md5sig_pool-for-TCP-AO/20230404-054020 base: 7e364e56293bb98cae1b55fd835f5991c4e96e7d patch link: https://lore.kernel.org/r/20230403213420.1576559-2-dima%40arista.com patch subject: [PATCH v5 01/21] [draft] net/tcp: Prepare tcp_md5sig_pool for TCP-AO config: i386-randconfig-s001-20230403 (https://download.01.org/0day-ci/archive/20230404/202304041119.egH8ZcDT-lkp@intel.com/config) compiler: gcc-11 (Debian 11.3.0-8) 11.3.0 reproduce: # apt-get install sparse # sparse version: v0.6.4-39-gce1a6720-dirty # https://github.com/intel-lab-lkp/linux/commit/94408bb4cf5cbcc772ab4d70eeb73bda183c6124 git remote add linux-review https://github.com/intel-lab-lkp/linux git fetch --no-tags linux-review Dmitry-Safonov/net-tcp-Prepare-tcp_md5sig_pool-for-TCP-AO/20230404-054020 git checkout 94408bb4cf5cbcc772ab4d70eeb73bda183c6124 # save the config file mkdir build_dir && cp config build_dir/.config make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=i386 olddefconfig make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=i386 SHELL=/bin/bash net/ipv4/ If you fix the issue, kindly add following tag where applicable | Reported-by: kernel test robot <lkp@...el.com> | Link: https://lore.kernel.org/oe-kbuild-all/202304041119.egH8ZcDT-lkp@intel.com/ sparse warnings: (new ones prefixed by >>) >> net/ipv4/tcp_sigpool.c:63:16: sparse: sparse: incompatible types in comparison expression (different type sizes): >> net/ipv4/tcp_sigpool.c:63:16: sparse: unsigned int * >> net/ipv4/tcp_sigpool.c:63:16: sparse: unsigned long * net/ipv4/tcp_sigpool.c:297:5: sparse: sparse: context imbalance in 'tcp_sigpool_start' - different lock contexts for basic block vim +63 net/ipv4/tcp_sigpool.c 43 44 /* 45 * sigpool_reserve_scratch - re-allocates scratch buffer, slow-path 46 * @size: request size for the scratch/temp buffer 47 */ 48 static int sigpool_reserve_scratch(size_t size) 49 { 50 struct scratches_to_free *stf; 51 size_t stf_sz = struct_size(stf, scratches, num_possible_cpus()); 52 int cpu, err = 0; 53 54 lockdep_assert_held(&cpool_mutex); 55 if (__scratch_size >= size) 56 return 0; 57 58 stf = kmalloc(stf_sz, GFP_KERNEL); 59 if (!stf) 60 return -ENOMEM; 61 stf->cnt = 0; 62 > 63 size = max(size, __scratch_size); 64 cpus_read_lock(); 65 for_each_possible_cpu(cpu) { 66 void *scratch, *old_scratch; 67 68 scratch = kmalloc_node(size, GFP_KERNEL, cpu_to_node(cpu)); 69 if (!scratch) { 70 err = -ENOMEM; 71 break; 72 } 73 74 old_scratch = rcu_replace_pointer(per_cpu(sigpool_scratch, cpu), scratch, lockdep_is_held(&cpool_mutex)); 75 if (!cpu_online(cpu) || !old_scratch) { 76 kfree(old_scratch); 77 continue; 78 } 79 stf->scratches[stf->cnt++] = old_scratch; 80 } 81 cpus_read_unlock(); 82 if (!err) 83 __scratch_size = size; 84 85 call_rcu(&stf->rcu, free_old_scratches); 86 return err; 87 } 88 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests
Powered by blists - more mailing lists