Re: [PATCH] kselftest/arm64: Fix uninitialized variable warning in FPMR test

2025-02-07 Thread Mark Brown
On Fri, Feb 07, 2025 at 10:45:39AM -0800, Breno Leitao wrote: > On Fri, Feb 07, 2025 at 05:26:06PM +, Mark Brown wrote: > > On Fri, Feb 07, 2025 at 03:06:42AM -0800, Breno Leitao wrote: > > > Fix compiler warning about potentially uninitialized orig_fpmr variable:

Re: [PATCH] kselftest/arm64: Fix uninitialized variable warning in FPMR test

2025-02-07 Thread Breno Leitao
Hello Mark, On Fri, Feb 07, 2025 at 05:26:06PM +, Mark Brown wrote: > On Fri, Feb 07, 2025 at 03:06:42AM -0800, Breno Leitao wrote: > > Fix compiler warning about potentially uninitialized orig_fpmr variable: > > > > testcases/fpmr_siginfo.c: In function ‘fpmr_presen

[PATCH 7/9] vhost: add WARNING if log_num is more than limit

2025-02-07 Thread Dongli Zhang
Since long time ago, the only user of vq->log is vhost-net. The concern is to add support for more devices (i.e. vhost-scsi or vsock) may reveals unknown issue in the vhost API. Add a WARNING. Suggested-by: Joao Martins Signed-off-by: Dongli Zhang --- drivers/vhost/vhost.c |

Re: [PATCH] kselftest/arm64: Fix uninitialized variable warning in FPMR test

2025-02-07 Thread Mark Brown
On Fri, Feb 07, 2025 at 03:06:42AM -0800, Breno Leitao wrote: > Fix compiler warning about potentially uninitialized orig_fpmr variable: > > testcases/fpmr_siginfo.c: In function ‘fpmr_present’: > testcases/fpmr_siginfo.c:68:25: warning: ‘orig_fpmr’ may be used > u

[PATCH] kselftest/arm64: Fix uninitialized variable warning in FPMR test

2025-02-07 Thread Breno Leitao
Fix compiler warning about potentially uninitialized orig_fpmr variable: testcases/fpmr_siginfo.c: In function ‘fpmr_present’: testcases/fpmr_siginfo.c:68:25: warning: ‘orig_fpmr’ may be used uninitialized in this function [-Wmaybe-uninitialized

Re: [PATCH rcu 6/5] Make RCU watch ct_kernel_exit_state() warning

2025-02-06 Thread Boqun Feng
On Thu, Feb 06, 2025 at 02:15:09AM -0800, Paul E. McKenney wrote: > The WARN_ON_ONCE() in ct_kernel_exit_state() follows the call to > ct_state_inc(), which means that RCU is not watching this WARN_ON_ONCE(). > This can (and does) result in extraneous lockdep warnings when this > WARN_ON_ONCE() tri

[PATCH rcu 6/5] Make RCU watch ct_kernel_exit_state() warning

2025-02-06 Thread Paul E. McKenney
The WARN_ON_ONCE() in ct_kernel_exit_state() follows the call to ct_state_inc(), which means that RCU is not watching this WARN_ON_ONCE(). This can (and does) result in extraneous lockdep warnings when this WARN_ON_ONCE() triggers. These extraneous warnings are the opposite of helpful. Therefore,

Re: [PATCH] selftests: pidfd: Fix compiling errors and warning

2025-02-05 Thread I Hsin Cheng
ll pop out as the following. > > > > CC pidfd_fdinfo_test > > pidfd_fdinfo_test.c: In function ‘child_fdinfo_nspid_test’: > > pidfd_fdinfo_test.c:231:13: warning: implicit declaration of function \ > > ‘mount’ [-Wimplicit-function-declaration] > >

Re: [PATCH] selftests: pidfd: Fix compiling warning of pidfs_setns

2025-02-05 Thread Peter Seiderer
Hello *, On Wed, 5 Feb 2025 13:50:31 +0800, I Hsin Cheng wrote: > In the compilation of pidfs_setns_test.c , a warning as the following > will pop out. > > pidfd_setns_test.c: In function ‘current_nsset_setup’: > pidfd_setns_test.c:173:54: warning: implicit declaration of func

Re: [PATCH] selftests: pidfd: Fix compiling errors and warning

2025-02-05 Thread Peter Seiderer
.c: In function ‘child_fdinfo_nspid_test’: > pidfd_fdinfo_test.c:231:13: warning: implicit declaration of function \ > ‘mount’ [-Wimplicit-function-declaration] > 231 | r = mount(NULL, "/", NULL, MS_REC | MS_PRIVATE, 0); > | ^ > pidfd_fdinfo_test.c:231:36: erro

[PATCH] selftests: pidfd: Fix compiling errors and warning

2025-02-04 Thread I Hsin Cheng
When compiling selftests files under tools/testing/selftests/pidfd/ , some compiling errors and warnings will pop out as the following. CC pidfd_fdinfo_test pidfd_fdinfo_test.c: In function ‘child_fdinfo_nspid_test’: pidfd_fdinfo_test.c:231:13: warning: implicit declaration of function

[PATCH] selftests: pidfd: Fix compiling warning of pidfs_setns

2025-02-04 Thread I Hsin Cheng
In the compilation of pidfs_setns_test.c , a warning as the following will pop out. pidfd_setns_test.c: In function ‘current_nsset_setup’: pidfd_setns_test.c:173:54: warning: implicit declaration of function \ ‘ioctl’ [-Wimplicit-function-declaration] 173 | self

[PATCH AUTOSEL 6.12 4/8] kunit: platform: Resolve 'struct completion' warning

2025-01-29 Thread Sasha Levin
From: Brian Norris [ Upstream commit 7687c66c18c66d4ccd9949c6f641c0e7b5773483 ] If the header is included in a test without certain other headers, it produces compiler warnings like: In file included from [...] ../include/kunit/platform_device.h:15:57: warning: ‘struct completion’ declared

[PATCH AUTOSEL 6.13 4/8] kunit: platform: Resolve 'struct completion' warning

2025-01-29 Thread Sasha Levin
From: Brian Norris [ Upstream commit 7687c66c18c66d4ccd9949c6f641c0e7b5773483 ] If the header is included in a test without certain other headers, it produces compiler warnings like: In file included from [...] ../include/kunit/platform_device.h:15:57: warning: ‘struct completion’ declared

Re: "WARNING in rcu_sr_normal_complete" in Linux Kernel v6.12-rc4

2025-01-28 Thread Uladzislau Rezki
On Thu, Jan 16, 2025 at 03:03:56PM +0100, Uladzislau Rezki wrote: > Hello, Cheung Wall! > > > > > I am writing to report a potential vulnerability identified in the > > Linux Kernel version v6.12-rc4. This vulnerability was discovered > > while i was testing the kernel. > > > > Linux Kernel Repo

Re: "WARNING in rcu_sr_normal_complete" in Linux Kernel v6.12-rc4

2025-01-16 Thread Uladzislau Rezki
Hello, Cheung Wall! > > I am writing to report a potential vulnerability identified in the > Linux Kernel version v6.12-rc4. This vulnerability was discovered > while i was testing the kernel. > > Linux Kernel Repository Git Commit: > 42f7652d3eb527d03665b09edac47f85fb600924 (tag: v6.12-rc4) >

"WARNING in rcu_sr_normal_complete" in Linux Kernel v6.12-rc4

2025-01-14 Thread cheung wall
Hello, I am writing to report a potential vulnerability identified in the Linux Kernel version v6.12-rc4. This vulnerability was discovered while i was testing the kernel. Linux Kernel Repository Git Commit: 42f7652d3eb527d03665b09edac47f85fb600924 (tag: v6.12-rc4) Bug Location: 0010:rcu_sr_norm

Re: [LTP] selftests: core: unshare_test: WARNING: at mm/util.c:671 __kvmalloc_node_noprof

2025-01-11 Thread Sasha Levin
On Wed, Dec 11, 2024 at 11:09:46AM +0530, Naresh Kamboju wrote: [Gentle Reminder] On Mon, 26 Aug 2024 at 18:50, Naresh Kamboju wrote: The following kernel warning is noticed on all arch and all devices while running selftests: core: unshare_test on Linux next-20240823 and next-20240826

Re: [syzbot] [wpan?] WARNING in cfg802154_switch_netns (3)

2025-01-10 Thread syzbot
[ cut here ]-------- WARNING: CPU: 0 PID: 5837 at net/ieee802154/core.c:258 cfg802154_switch_netns+0x3c7/0x3d0 net/ieee802154/core.c:258 Modules linked in: CPU: 0 UID: 0 PID: 5837 Comm: syz-executor125 Not tainted 6.13.0-rc6-syzkaller-00918-g7b24f164cf00 #0 Hardware name: Google Google Compute Engine/Goog

Re: rust/kernel/lib.rs:17:12 : warning: the feature `new_uninit` has been stable since 1.82.0 and no longer requires an attribute to enable

2025-01-06 Thread Naresh Kamboju
On Sun, 5 Jan 2025 at 19:52, Sasha Levin wrote: > > I'm sorry, this is my bad: I haven't realized anyone else will be > looking at these results... > > Naresh, I'm cheating and using this tree to bisect the issue you've > originally reported in > https://lore.kernel.org/all/ca+g9fyvcbvbabg+m7brkfp

Re: rust/kernel/lib.rs:17:12 : warning: the feature `new_uninit` has been stable since 1.82.0 and no longer requires an attribute to enable

2025-01-05 Thread Sasha Levin
I'm sorry, this is my bad: I haven't realized anyone else will be looking at these results... Naresh, I'm cheating and using this tree to bisect the issue you've originally reported in https://lore.kernel.org/all/ca+g9fyvcbvbabg+m7brkfpgcgzuck+khhtfx7hfvw6gmn2x...@mail.gmail.com/ . It seems we c

Re: rust/kernel/lib.rs:17:12 : warning: the feature `new_uninit` has been stable since 1.82.0 and no longer requires an attribute to enable

2025-01-05 Thread Miguel Ojeda
On Sun, Jan 5, 2025 at 2:33 PM Miguel Ojeda wrote: > > Thanks for the report! I think there is nothing to be done here given > the details above. To clarify: v6.11.y is newer (and EOL), v6.12.y LTS is newer, and older LTSs had the Rust toolchain pinned. If there is something I am missing, please

Re: rust/kernel/lib.rs:17:12 : warning: the feature `new_uninit` has been stable since 1.82.0 and no longer requires an attribute to enable

2025-01-05 Thread Miguel Ojeda
eem unrelated, old but rebased/recommitted recently (without SoB). > warning: the feature `new_uninit` has been stable since 1.82.0 and no > longer requires an attribute to enable > --> /rust/kernel/lib.rs:17:12 >| > 17 | #![feature(new_uninit)] >|

rust/kernel/lib.rs:17:12 : warning: the feature `new_uninit` has been stable since 1.82.0 and no longer requires an attribute to enable

2025-01-05 Thread Naresh Kamboju
The following kselftest rust builds failed on sashal/linus-next.git due to following build warnings / errors. Good: 829d8581c398a96deea1d6bc78578950347dcbec Bad: b2d472701a703596889c3fd067fd8929aeffc4be Build error: -- warning: the feature `new_uninit` has been stable since 1.82.0

Re: [PATCH] kunit: platform: Resolve 'struct completion' warning

2024-12-18 Thread David Gow
On Sat, 14 Dec 2024 at 02:09, Brian Norris wrote: > > If the header is included in a test without > certain other headers, it produces compiler warnings like: > > In file included from [...] > ../include/kunit/platform_device.h:15:57: warning: ‘struct completion’ > declared

Re: [syzbot] [mm?] WARNING: locking bug in __rmqueue_pcplist

2024-12-15 Thread syzbot
syzbot has found a reproducer for the following issue on: HEAD commit:a0e3919a2df2 Merge tag 'usb-6.13-rc3' of git://git.kernel... git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=15a4c34458 kernel config: https://syzkaller.appspot.com/x/.config?x=b874549

[PATCH] kunit: platform: Resolve 'struct completion' warning

2024-12-13 Thread Brian Norris
If the header is included in a test without certain other headers, it produces compiler warnings like: In file included from [...] ../include/kunit/platform_device.h:15:57: warning: ‘struct completion’ declared inside parameter list will not be visible outside of this definition or declaration

Re: selftests: core: unshare_test: WARNING: at mm/util.c:671 __kvmalloc_node_noprof

2024-12-10 Thread Naresh Kamboju
[Gentle Reminder] On Mon, 26 Aug 2024 at 18:50, Naresh Kamboju wrote: > > The following kernel warning is noticed on all arch and all devices while > running selftests: core: unshare_test on Linux next-20240823 and > next-20240826. > > First seen on next-20240823. >

[syzbot] [wpan?] WARNING in cfg802154_switch_netns (3)

2024-12-04 Thread syzbot
ue, please add the following tag to the commit: Reported-by: syzbot+bd5829ba3619f08e2...@syzkaller.appspotmail.com R10: R11: 0246 R12: 0002 R13: R14: 7f2cedb45fa0 R15: 7ffcd711e1d8 [ cut here ]-------- WARNING: CPU: 0

[syzbot] [wpan?] WARNING in __dev_change_net_namespace (3)

2024-11-29 Thread syzbot
---[ cut here ] WARNING: CPU: 0 PID: 5337 at net/core/dev.c:11738 __dev_change_net_namespace+0x16ed/0x1820 net/core/dev.c:11738 Modules linked in: CPU: 0 UID: 0 PID: 5337 Comm: syz.0.0 Not tainted 6.12.0-syzkaller-09073-g9f16d5e6f220 #0 Hardware name: QEMU Standard PC (Q35 + ICH9

Re: [syzbot] [mm?] WARNING: locking bug in __rmqueue_pcplist

2024-11-13 Thread Sebastian Andrzej Siewior
On 2024-11-04 12:47:26 [+0100], Peter Zijlstra wrote: > On Mon, Nov 04, 2024 at 12:45:06PM +0100, Peter Zijlstra wrote: > > diff --git a/mm/kasan/generic.c b/mm/kasan/generic.c > > index 6310a180278b..ac9f6682bb2f 100644 > > --- a/mm/kasan/generic.c > > +++ b/mm/kasan/generic.c > > @@ -521,12 +521,

[PATCH 2/3] rcu: Stop stall warning from dumping stacks if grace period ends

2024-11-12 Thread Frederic Weisbecker
From: "Paul E. McKenney" Currently, once an RCU CPU stall warning decides to dump the stalling CPUs' stacks, the rcu_dump_cpu_stacks() function persists until it has gone through the full list. Unfortunately, if the stalled grace periods ends midway through, this function will be

Re: [syzbot] [mm?] WARNING: locking bug in __rmqueue_pcplist

2024-11-04 Thread Marco Elver
On Mon, 4 Nov 2024 at 12:45, Peter Zijlstra wrote: > > On Mon, Nov 04, 2024 at 12:25:03PM +0100, Vlastimil Babka wrote: > > On 11/4/24 12:11, Vlastimil Babka wrote: > > > >> __alloc_pages_noprof+0x292/0x710 mm/page_alloc.c:4771 > > >> alloc_pages_mpol_noprof+0x3e8/0x680 mm/mempolicy.c:2265 > > >

Re: [syzbot] [mm?] WARNING: locking bug in __rmqueue_pcplist

2024-11-04 Thread Peter Zijlstra
On Mon, Nov 04, 2024 at 12:25:03PM +0100, Vlastimil Babka wrote: > On 11/4/24 12:11, Vlastimil Babka wrote: > >> __alloc_pages_noprof+0x292/0x710 mm/page_alloc.c:4771 > >> alloc_pages_mpol_noprof+0x3e8/0x680 mm/mempolicy.c:2265 > >> stack_depot_save_flags+0x666/0x830 lib/stackdepot.c:627 > >>

Re: [syzbot] [mm?] WARNING: locking bug in __rmqueue_pcplist

2024-11-04 Thread Peter Zijlstra
On Mon, Nov 04, 2024 at 12:45:06PM +0100, Peter Zijlstra wrote: > diff --git a/mm/kasan/generic.c b/mm/kasan/generic.c > index 6310a180278b..ac9f6682bb2f 100644 > --- a/mm/kasan/generic.c > +++ b/mm/kasan/generic.c > @@ -521,12 +521,12 @@ size_t kasan_metadata_size(struct kmem_cache *cache, > bool

Re: [PATCH v1 1/2] selftests/x86/syscall: fix coccinelle WARNING recommending the use of ARRAY_SIZE()

2024-11-02 Thread Mirsad Todorovac
On 11/1/24 13:04, Muhammad Usama Anjum wrote: > On 11/1/24 4:15 PM, Mirsad Todorovac wrote: >> Coccinelle gives WARNING recommending the use of ARRAY_SIZE() macro >> definition >> to improve the code readability: >> >> ./tools/testing/selftests/x86/syscall_nu

Re: [PATCH v1 2/2] selftests/mm: fix coccinelle WARNING recommending the use of ARRAY_SIZE()

2024-11-02 Thread Mirsad Todorovac
On 11/1/24 14:48, Peter Xu wrote: > On Fri, Nov 01, 2024 at 12:15:25PM +0100, Mirsad Todorovac wrote: >> Coccinelle gives WARNING recommending the use of ARRAY_SIZE() macro >> definition >> to improve the code readability: >> >> ./tools/testing/selftest

Re: [PATCH v1 2/2] selftests/mm: fix coccinelle WARNING recommending the use of ARRAY_SIZE()

2024-11-01 Thread Peter Xu
On Fri, Nov 01, 2024 at 12:15:25PM +0100, Mirsad Todorovac wrote: > Coccinelle gives WARNING recommending the use of ARRAY_SIZE() macro definition > to improve the code readability: > > ./tools/testing/selftests/mm/uffd-unit-tests.c:1484:32-33: WARNING: Use > ARRAY_SIZE &g

Re: [PATCH v1 1/2] selftests/x86/syscall: fix coccinelle WARNING recommending the use of ARRAY_SIZE()

2024-11-01 Thread Muhammad Usama Anjum
On 11/1/24 4:15 PM, Mirsad Todorovac wrote: > Coccinelle gives WARNING recommending the use of ARRAY_SIZE() macro definition > to improve the code readability: > > ./tools/testing/selftests/x86/syscall_numbering.c:316:35-36: WARNING: Use > ARRAY_SIZE > > Fixes: 15c82d98

[PATCH v1 1/2] selftests/x86/syscall: fix coccinelle WARNING recommending the use of ARRAY_SIZE()

2024-11-01 Thread Mirsad Todorovac
Coccinelle gives WARNING recommending the use of ARRAY_SIZE() macro definition to improve the code readability: ./tools/testing/selftests/x86/syscall_numbering.c:316:35-36: WARNING: Use ARRAY_SIZE Fixes: 15c82d98a0f78 ("selftests/x86/syscall: Update and extend syscall_numbering_64")

[PATCH v1 2/2] selftests/mm: fix coccinelle WARNING recommending the use of ARRAY_SIZE()

2024-11-01 Thread Mirsad Todorovac
Coccinelle gives WARNING recommending the use of ARRAY_SIZE() macro definition to improve the code readability: ./tools/testing/selftests/mm/uffd-unit-tests.c:1484:32-33: WARNING: Use ARRAY_SIZE ./tools/testing/selftests/mm/uffd-unit-tests.c:1485:30-31: WARNING: Use ARRAY_SIZE Fixes

Re: [PATCH v2 rcu 0/3] RCU CPU stall-warning changes for v6.13

2024-10-18 Thread Frederic Weisbecker
Le Wed, Oct 16, 2024 at 09:18:52AM -0700, Paul E. McKenney a écrit : > Hello! > > This series contains RCU CPU stall-warning changes for v6.13: > > 1.Delete unused rcu_gp_might_be_stalled() function. > > 2. Stop stall warning from dumping stacks if grace period e

[PATCH v2 rcu 2/3] rcu: Stop stall warning from dumping stacks if grace period ends

2024-10-16 Thread Paul E. McKenney
Currently, once an RCU CPU stall warning decides to dump the stalling CPUs' stacks, the rcu_dump_cpu_stacks() function persists until it has gone through the full list. Unfortunately, if the stalled grace periods ends midway through, this function will be dumping stacks of innocent-bystander

[PATCH v2 rcu 0/3] RCU CPU stall-warning changes for v6.13

2024-10-16 Thread Paul E. McKenney
Hello! This series contains RCU CPU stall-warning changes for v6.13: 1. Delete unused rcu_gp_might_be_stalled() function. 2. Stop stall warning from dumping stacks if grace period ends. 3. Finer-grained grace-period-end checks in rcu_dump_cpu_stacks(). Changes since v1: o

Re: [PATCH rcu 0/3] RCU CPU stall-warning changes for v6.13

2024-10-15 Thread Joel Fernandes
On Tue, Oct 15, 2024 at 04:02:37PM -0700, Paul E. McKenney wrote: > On Tue, Oct 15, 2024 at 02:49:06PM -0400, Joel Fernandes wrote: > > On Wed, Oct 09, 2024 at 11:05:02AM -0700, Paul E. McKenney wrote: > > > Hello! > > > > > > This series contains RCU

Re: [PATCH rcu 0/3] RCU CPU stall-warning changes for v6.13

2024-10-15 Thread Paul E. McKenney
On Tue, Oct 15, 2024 at 02:49:06PM -0400, Joel Fernandes wrote: > On Wed, Oct 09, 2024 at 11:05:02AM -0700, Paul E. McKenney wrote: > > Hello! > > > > This series contains RCU CPU stall-warning changes for v6.13: > > > > 1. Delete unused rcu_gp_might_be_stal

Re: [PATCH rcu 0/3] RCU CPU stall-warning changes for v6.13

2024-10-15 Thread Joel Fernandes
On Wed, Oct 09, 2024 at 11:05:02AM -0700, Paul E. McKenney wrote: > Hello! > > This series contains RCU CPU stall-warning changes for v6.13: > > 1.Delete unused rcu_gp_might_be_stalled() function. > > 2. Stop stall warning from dumping stacks if grace period e

Re: [PATCH rcu 2/3] rcu: Stop stall warning from dumping stacks if grace period ends

2024-10-15 Thread Joel Fernandes
On Wed, Oct 09, 2024 at 11:05:08AM -0700, Paul E. McKenney wrote: > Currently, once an RCU CPU stall warning decides to dump the stalling > CPUs' stacks, the rcu_dump_cpu_stacks() function persists until it > has gone through the full list. Unfortunately, if the stalled grace

[PATCH rcu 2/3] rcu: Stop stall warning from dumping stacks if grace period ends

2024-10-09 Thread Paul E. McKenney
Currently, once an RCU CPU stall warning decides to dump the stalling CPUs' stacks, the rcu_dump_cpu_stacks() function persists until it has gone through the full list. Unfortunately, if the stalled grace periods ends midway through, this function will be dumping stacks of innocent-bystander

[PATCH rcu 0/3] RCU CPU stall-warning changes for v6.13

2024-10-09 Thread Paul E. McKenney
Hello! This series contains RCU CPU stall-warning changes for v6.13: 1. Delete unused rcu_gp_might_be_stalled() function. 2. Stop stall warning from dumping stacks if grace period ends. 3. Finer-grained grace-period-end checks in rcu_dump_cpu_stacks

Re: [PATCH v4 0/2] virtiofs: fix the warning for kernel direct IO

2024-10-08 Thread Miklos Szeredi
On Sat, 31 Aug 2024 at 11:38, Hou Tao wrote: > > From: Hou Tao > > Hi, > > The patch set aims to fix the warning related to an abnormal size > parameter of kmalloc() in virtiofs. Patch #1 fixes it by introducing > use_pages_for_kvec_io option in fuse_conn and enabling

Re: BUG: WARNING in kvfree_rcu_bulk

2024-09-16 Thread Uladzislau Rezki
> After several tests, I found that the same PoC can cause multiple > different crashes for some unknown reason. Thus, I suspect that the > bug is capable of performing unintended memory writing without being > caught by KASAN. > I tested the PoC on the latest kernel, Linux 6.11 rc7 and it can stil

Re: BUG: WARNING in kvfree_rcu_bulk

2024-09-15 Thread Juefei Pu
[C0] ? __pfx___run_timers+0x10/0x10 > > [ 657.469401][C0] ? __pfx_lock_acquire+0x10/0x10 > > [ 657.471986][C0] ? lock_acquire+0x1ad/0x550 > > [ 657.474472][C0] timer_expire_remote+0xfb/0x160 > > [ 657.477069][C0] ? __pfx_timer_expire_remote+0x10/0x10 &g

Re: BUG: WARNING in kvfree_rcu_bulk

2024-09-15 Thread Xingyu Li
? __pfx_kthread+0x10/0x10 > [ 657.529240][C0] ret_from_fork+0x44/0x70 > [ 657.531687][C0] ? __pfx_kthread+0x10/0x10 > [ 657.534185][C0] ret_from_fork_asm+0x1a/0x30 > [ 657.536744][C0] > [ 657.538752][C0] Modules linked in: > [ 657.541038][C0] ---[

[syzbot] [acpi?] [nvdimm?] WARNING in to_nfit_bus_uuid

2024-09-14 Thread syzbot
bot-assets/1aed2837c105/bzImage-8d8d276b.xz IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+c80d8dc0d9fa81a3c...@syzkaller.appspotmail.com [ cut here ] only secondary bus families can be translated WARNING: CPU: 0 PID: 15821

Re: BUG: WARNING in kvfree_rcu_bulk

2024-09-12 Thread Uladzislau Rezki
disabled is about list corruption BUG. So they are different and looks like something is corrupted. So i would not trust that your report is about kvfree_rcu_bulk() warning is related to a real issue with kvfree_rcu() call. A also run the reproducer on the 6.11.0-rc7 kernel. It still runs without any panics yet. Could you please test the latest kernel? For example 6.11.0-rc7? -- Uladzislau Rezki

[PATCH v4 0/1] fix sysfs patch build warning and add fixes

2024-09-10 Thread Chunhui Li
Hi Maintainer, V4: -Fix build warning when CONFIG_KALLSYMS is not enabled; -Add Fixes tag; I can't find add_sect_attrs and add_notes_attrs commit in linux.next git log, and Petr Pavlu show /sys/module patch link when review, so I label Fixes as below, If incorrect please notify me.

Re: [syzbot] [wpan?] WARNING in __dev_change_net_namespace (2)

2024-09-07 Thread Kuniyuki Iwashima
pspotmail.com > > R10: R11: 0293 R12: > R13: 00000000 R14: R15: > > [ cut here ] > WARNING: CPU: 3 PID: 14392 at net/core/dev.c:11431 > __dev_change_net_namespace+0x1048/

Re: [syzbot] [wpan?] WARNING in __dev_change_net_namespace (2)

2024-09-07 Thread syzbot
fc64b5c120 R15: [ cut here ]-------- WARNING: CPU: 0 PID: 5214 at net/core/dev.c:11568 __dev_change_net_namespace+0x171a/0x1830 net/core/dev.c:11568 Modules linked in: CPU: 0 UID: 0 PID: 5214 Comm: syz-executor241 Not tainted 6.11.0-rc6-syzkaller-00326-gd1f2d

Re: [PATCH net-next] virtio_net: Fix napi_skb_cache_put warning

2024-09-05 Thread Breno Leitao
t fixes stuff in there. > > The fact that the warning was only made visible in > bdacf3e34945 ("net: Use nested-BH locking for napi_alloc_cache.") > does not change the fact that it was already present before. > > Also, having bdacf3e34945 is not necessary for

Re: [PATCH v4.19-v5.10] virtio_net: Fix napi_skb_cache_put warning

2024-09-05 Thread Greg KH
On Wed, Sep 04, 2024 at 02:08:53AM -0700, Shivani Agarwal wrote: > From: Breno Leitao > > [ Upstream commit f8321fa75102246d7415a6af441872f6637c93ab ] > > After the commit bdacf3e34945 ("net: Use nested-BH locking for > napi_alloc_cache.") was merged, the follo

Re: BUG: WARNING in kvfree_rcu_bulk

2024-09-04 Thread Xingyu Li
> sudo modprobe hci > sudo modprobe hci_vhci > sudo modprobe mac802154 > sudo modprobe ieee802154 > sudo modprobe ieee802154_socket > sudo modprobe mac802154_hwsim > sudo modprobe adf7242 > sudo modprobe atusb > sudo modprobe at86rf230 > sudo modprobe fakelb

Re: BUG: WARNING in kvfree_rcu_bulk

2024-09-04 Thread Uladzislau Rezki
d even after that i am not able to get any "WARNING in kvfree_rcu_bulk". urezki@pc638:~$ uname -a Linux pc638 6.11.0-rc2+ #3827 SMP PREEMPT_DYNAMIC Wed Sep 4 19:37:22 CEST 2024 x86_64 GNU/Linux urezki@pc638:~$ is it easy to reproduce? Am i missing something in my setup? -- Uladzislau Rezki

Re: [PATCH] um: kunit: resolve missing prototypes warning

2024-09-04 Thread Gabriele Monaco
First of all, thanks for the quick reply > I get that you have this on kunit on ARCH=um, but that makes it > neither > a kunit nor a um patch :) Well, yes I wasn't entirely sure how to put it, sure people from UM/KUnit know what this is about, but I agree perhaps the patch title can be a bit mi

Re: [PATCH] um: kunit: resolve missing prototypes warning

2024-09-04 Thread Johannes Berg
On Wed, 2024-09-04 at 15:50 +0200, Gabriele Monaco wrote: > While building for KUnit with default settings, the build is generating > the following compilation warnings. > > ``` > $ make ARCH=um O=.kunit --jobs=16 > ../lib/iomap.c:156:5: warning: no previous prototype for

[PATCH] um: kunit: resolve missing prototypes warning

2024-09-04 Thread Gabriele Monaco
While building for KUnit with default settings, the build is generating the following compilation warnings. ``` $ make ARCH=um O=.kunit --jobs=16 ../lib/iomap.c:156:5: warning: no previous prototype for ‘ioread64_lo_hi’ [-Wmissing-prototypes] 156 | u64 ioread64_lo_hi(const void __iomem *addr

[PATCH v4.19-v5.10] virtio_net: Fix napi_skb_cache_put warning

2024-09-04 Thread Shivani Agarwal
From: Breno Leitao [ Upstream commit f8321fa75102246d7415a6af441872f6637c93ab ] After the commit bdacf3e34945 ("net: Use nested-BH locking for napi_alloc_cache.") was merged, the following warning began to appear: WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 napi_skb

[PATCH v5.15] virtio_net: Fix napi_skb_cache_put warning

2024-09-04 Thread Shivani Agarwal
From: Breno Leitao [ Upstream commit f8321fa75102246d7415a6af441872f6637c93ab ] After the commit bdacf3e34945 ("net: Use nested-BH locking for napi_alloc_cache.") was merged, the following warning began to appear: WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 napi_skb

[PATCH v6.1] virtio_net: Fix napi_skb_cache_put warning

2024-09-04 Thread Shivani Agarwal
From: Breno Leitao [ Upstream commit f8321fa75102246d7415a6af441872f6637c93ab ] After the commit bdacf3e34945 ("net: Use nested-BH locking for napi_alloc_cache.") was merged, the following warning began to appear: WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 napi_skb

[PATCH v6.6] virtio_net: Fix napi_skb_cache_put warning

2024-09-04 Thread Shivani Agarwal
From: Breno Leitao [ Upstream commit f8321fa75102246d7415a6af441872f6637c93ab ] After the commit bdacf3e34945 ("net: Use nested-BH locking for napi_alloc_cache.") was merged, the following warning began to appear: WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 napi_skb

Re: [syzbot] [wpan?] WARNING in __dev_change_net_namespace (2)

2024-09-04 Thread syzbot
ou fix the issue, please add the following tag to the commit: Reported-by: syzbot+1df6ffa7a6274ae26...@syzkaller.appspotmail.com R10: R11: 0246 R12: 0002 R13: R14: 7f95c6735f80 R15: 7ffd0db2c528 [ cut here ]-------- WA

Re: [PATCH net-next] virtio_net: Fix napi_skb_cache_put warning

2024-09-03 Thread Leonardo Bras
et: Use nested-BH locking for > > > napi_alloc_cache.") was merged, the following warning began to appear: > > > > > >WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 > > > napi_skb_cache_put+0x82/0x4b0 > > > > > > __warn+0x1

Re: [PATCH] x86/sgx: Fix a W=1 build warning in function comment

2024-08-27 Thread Jarkko Sakkinen
On Sun Aug 25, 2024 at 11:06 AM EEST, Kai Huang wrote: > Building the SGX code with W=1 generates below warning: > > arch/x86/kernel/cpu/sgx/main.c:741: warning: Function parameter or struct > member 'low' not described in 'sgx_calc_section_metric' >

[syzbot] [bpf?] [trace?] WARNING in bpf_get_stack_raw_tp

2024-08-26 Thread syzbot
72cf28b.xz IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+ce35de20ed6652f60...@syzkaller.appspotmail.com [ cut here ]-------- WARNING: CPU: 0 PID: 5229 at kernel/trace/bpf_trace.c:1917 get_bpf_raw_tp_regs kernel/trace/bpf_trace.c:19

[PATCH] x86/sgx: Fix a W=1 build warning in function comment

2024-08-25 Thread Kai Huang
Building the SGX code with W=1 generates below warning: arch/x86/kernel/cpu/sgx/main.c:741: warning: Function parameter or struct member 'low' not described in 'sgx_calc_section_metric' arch/x86/kernel/cpu/sgx/main.c:741: warning: Function parameter or struct member &#x

Re: WARNING in uprobe_unregister

2024-08-22 Thread Jiri Olsa
e. > > Stack dump: > > ----[ cut here ] > WARNING: CPU: 1 PID: 14015 at kernel/events/uprobes.c:1107 > uprobe_unregister+0x66/0x80 kernel/events/uprobes.c:1107 > Modules linked in: > CPU: 1 PID: 14015 Comm: syz.0.291 Not tainted 6.8.0 #1 > Hardware name:

Re: [PATCH v3 0/2] virtiofs: fix the warning for kernel direct IO

2024-08-14 Thread Jingbo Xu
On 8/14/24 3:46 PM, Hou Tao wrote: > Hi, > > On 8/14/2024 2:34 PM, Jingbo Xu wrote: >> Hi, Tao, >> >> On 4/26/24 10:39 PM, Hou Tao wrote: >>> From: Hou Tao >>> >>> Hi, >>> >>> The patch set aims to fix the warning rela

Re: [PATCH v3 0/2] virtiofs: fix the warning for kernel direct IO

2024-08-14 Thread Hou Tao
Hi, On 8/14/2024 2:34 PM, Jingbo Xu wrote: > Hi, Tao, > > On 4/26/24 10:39 PM, Hou Tao wrote: >> From: Hou Tao >> >> Hi, >> >> The patch set aims to fix the warning related to an abnormal size >> parameter of kmalloc() in virtiofs. Patch #1 fixes it b

Re: [PATCH v3 0/2] virtiofs: fix the warning for kernel direct IO

2024-08-13 Thread Jingbo Xu
Hi, Tao, On 4/26/24 10:39 PM, Hou Tao wrote: > From: Hou Tao > > Hi, > > The patch set aims to fix the warning related to an abnormal size > parameter of kmalloc() in virtiofs. Patch #1 fixes it by introducing > use_pages_for_kvec_io option in fuse_conn and enabling it

Re: WARNING in free_event

2024-08-06 Thread Peter Zijlstra
could not readily reproduce on a current kernel. Please double check against the latest kernel. > Stack dump: > > [ cut here ] > unexpected event refcount: 2; ptr=888019589820 > WARNING: CPU: 0 PID: 13593 at kernel/events/core.c:5254 free_event+0xa3/

WARNING in free_event

2024-08-04 Thread Ubisectech Sirius
=888019589820 WARNING: CPU: 0 PID: 13593 at kernel/events/core.c:5254 free_event+0xa3/0xc0 kernel/events/core.c:5254 Modules linked in: CPU: 0 PID: 13593 Comm: syz.3.346 Not tainted 6.8.0 #1 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 RIP: 0010:free_event+0xa3/0xc0 kernel

Re: [syzbot] [trace?] linux-next test error: WARNING in rcu_core

2024-08-02 Thread Marco Elver
; IMPORTANT: if you fix the issue, please add the following tag to the commit: > Reported-by: syzbot+263726e59eab6b442...@syzkaller.appspotmail.com > > [ cut here ] > WARNING: CPU: 0 PID: 1 at mm/slub.c:4550 > slab_free_after_rcu_debug+0x18b/0x270 mm/slub.c:4550 See https://lore.kernel.org/all/zqyths-o85nqu...@elver.google.com/T/#u

[syzbot] [trace?] linux-next test error: WARNING in rcu_core

2024-08-02 Thread syzbot
[ cut here ] WARNING: CPU: 0 PID: 1 at mm/slub.c:4550 slab_free_after_rcu_debug+0x18b/0x270 mm/slub.c:4550 Modules linked in: CPU: 0 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.11.0-rc1-next-20240802-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute

Re: [PATCH net-next] virtio_net: Fix napi_skb_cache_put warning

2024-07-15 Thread Breno Leitao
Hello Michael, On Sun, Jul 14, 2024 at 03:38:42AM -0400, Michael S. Tsirkin wrote: > On Fri, Jul 12, 2024 at 04:53:25AM -0700, Breno Leitao wrote: > > After the commit bdacf3e34945 ("net: Use nested-BH locking for > > napi_alloc_cache.") was merged, the followin

Re: [PATCH net-next] virtio_net: Fix napi_skb_cache_put warning

2024-07-14 Thread patchwork-bot+netdevbpf
Hello: This patch was applied to netdev/net-next.git (main) by Jakub Kicinski : On Fri, 12 Jul 2024 04:53:25 -0700 you wrote: > After the commit bdacf3e34945 ("net: Use nested-BH locking for > napi_alloc_cache.") was merged, the following warning began to appear: > >

Re: [PATCH net-next] virtio_net: Fix napi_skb_cache_put warning

2024-07-14 Thread Heng Qi
在 2024/7/12 下午7:53, Breno Leitao 写道: After the commit bdacf3e34945 ("net: Use nested-BH locking for napi_alloc_cache.") was merged, the following warning began to appear: WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 napi_skb_cache_put+0x82/0x4b0 __warn+0

Re: [PATCH net-next] virtio_net: Fix napi_skb_cache_put warning

2024-07-14 Thread Jason Wang
On Fri, Jul 12, 2024 at 7:54 PM Breno Leitao wrote: > > After the commit bdacf3e34945 ("net: Use nested-BH locking for > napi_alloc_cache.") was merged, the following warning began to appear: > > WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 > n

Re: [PATCH net-next] virtio_net: Fix napi_skb_cache_put warning

2024-07-14 Thread Michael S. Tsirkin
On Fri, Jul 12, 2024 at 04:53:25AM -0700, Breno Leitao wrote: > After the commit bdacf3e34945 ("net: Use nested-BH locking for > napi_alloc_cache.") was merged, the following warning began to appear: > >WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 > napi

Re: [PATCH net-next] virtio_net: Fix napi_skb_cache_put warning

2024-07-13 Thread Jakub Kicinski
On Fri, 12 Jul 2024 07:58:49 -0700 Breno Leitao wrote: > I didn't send to `net` since this WARNING is only "showing" in net-next, > due to commit bdacf3e34945 ("net: Use nested-BH locking for > napi_alloc_cache.") being only in net-next. > > But you have a

Re: [PATCH net-next] virtio_net: Fix napi_skb_cache_put warning

2024-07-12 Thread Jakub Kicinski
On Fri, 12 Jul 2024 04:53:25 -0700 Breno Leitao wrote: > After the commit bdacf3e34945 ("net: Use nested-BH locking for > napi_alloc_cache.") was merged, the following warning began to appear: > >WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 > napi

Re: [PATCH net-next] virtio_net: Fix napi_skb_cache_put warning

2024-07-12 Thread Breno Leitao
Hello Jakub, On Fri, Jul 12, 2024 at 07:54:32AM -0700, Jakub Kicinski wrote: > On Fri, 12 Jul 2024 04:53:25 -0700 Breno Leitao wrote: > > Subject: [PATCH net-next] virtio_net: Fix napi_skb_cache_put warning > > [PATCH net] for fixes so that the bot knows what to test against

Re: [PATCH net-next] virtio_net: Fix napi_skb_cache_put warning

2024-07-12 Thread Jakub Kicinski
On Fri, 12 Jul 2024 04:53:25 -0700 Breno Leitao wrote: > Subject: [PATCH net-next] virtio_net: Fix napi_skb_cache_put warning [PATCH net] for fixes so that the bot knows what to test against :) No need to repost (this time).

[PATCH net-next] virtio_net: Fix napi_skb_cache_put warning

2024-07-12 Thread Breno Leitao
After the commit bdacf3e34945 ("net: Use nested-BH locking for napi_alloc_cache.") was merged, the following warning began to appear: WARNING: CPU: 5 PID: 1 at net/core/skbuff.c:1451 napi_skb_cache_put+0x82/0x4b0 __warn+0x12f/0x340 napi_skb_cache_put+

Re: [PATCH v3] init: staging: Fix missing warning/taint on builtin code

2024-07-10 Thread Greg Kroah-Hartman
On Sat, Jul 06, 2024 at 12:15:01AM -0300, Ágatha Isabelle Chris Moreira Guedes wrote: > Fix the absence of warning message and kernel tainting when initializing > drivers from the `drivers/staging` subtree from initcalls (when > configured as built-in). > > When such a driver is

Re: [PATCH v3] init: staging: Fix missing warning/taint on builtin code

2024-07-08 Thread Uwe Kleine-König
Hello, On Sat, Jul 06, 2024 at 12:15:01AM -0300, Ágatha Isabelle Chris Moreira Guedes wrote: > Fix the absence of warning message and kernel tainting when initializing > drivers from the `drivers/staging` subtree from initcalls (when > configured as built-in). > > When such a dri

Re: [PATCH v3] init: staging: Fix missing warning/taint on builtin code

2024-07-08 Thread Dan Carpenter
Thanks! Acked-by: Dan Carpenter regards, dan carpenter

[PATCH v3] init: staging: Fix missing warning/taint on builtin code

2024-07-05 Thread Ágatha Isabelle Chris Moreira Guedes
Fix the absence of warning message and kernel tainting when initializing drivers from the `drivers/staging` subtree from initcalls (when configured as built-in). When such a driver is built as module and the module is loaded, the `load_module()` function taints the kernel to signal code of

Re: [PATCH v2] init: staging: Fix missing warning/taint on builtin code

2024-07-05 Thread Dan Carpenter
On Thu, Jul 04, 2024 at 09:20:49PM -0300, Ágatha Isabelle Chris Moreira Guedes wrote: > +#ifdef CONFIG_STAGING > +/** > + * staging_init_taint() - We need to taint the kernel whenever staging code > + * is initialized (from built-in drivers) or loaded (as modules) and issue > +

Re: [PATCH v2] init: staging: Fix missing warning/taint on builtin code

2024-07-05 Thread Ágatha Isabelle Chris Moreira Guedes
ere `CONFIG_STAGING=n` because: > +/** > + * staging_init_taint() - We need to taint the kernel whenever staging code > + * is initialized (from built-in drivers) or loaded (as modules) and issue > + * a warning the first time it happens. > + */ > +void staging_taint(const char *code_id,

[PATCH v2] init: staging: Fix missing warning/taint on builtin code

2024-07-04 Thread Ágatha Isabelle Chris Moreira Guedes
Fix the absence of warning message and kernel tainting when initializing drivers from the `drivers/staging` subtree from initcalls (when configured as built-in). When such a driver is built as module and the module is loaded, the `load_module()` function taints the kernel to signal code of

  1   2   3   4   5   6   7   8   9   10   >