mailweb.openeuler.org
Manage this list

Keyboard Shortcuts

Thread View

  • j: Next unread message
  • k: Previous unread message
  • j a: Jump to all threads
  • j l: Jump to MailingList overview

Kernel

Threads by month
  • ----- 2025 -----
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2024 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2023 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2022 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2021 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2020 -----
  • December
  • November
  • October
  • September
  • August
  • July
  • June
  • May
  • April
  • March
  • February
  • January
  • ----- 2019 -----
  • December
kernel@openeuler.org

  • 5 participants
  • 18867 discussions
[openeuler:OLK-6.6 2411/2411] drivers/crypto/ccp/hygon/vpsp.c:589:6: warning: no previous prototype for 'vpsp_set_default_vid_permission'
by kernel test robot 29 Jun '25

29 Jun '25
tree: https://gitee.com/openeuler/kernel.git OLK-6.6 head: c02455c4cce8052f74fc11c09e9073c01c7f33a4 commit: e2861aaa47961017ada7f66de11104bbf3b85eb1 [2411/2411] crypto: ccp: move vpsp-related functions to vpsp.c config: x86_64-buildonly-randconfig-2001-20250626 (https://download.01.org/0day-ci/archive/20250629/202506291537.ZBDFCNhr-lkp@…) compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250629/202506291537.ZBDFCNhr-lkp@…) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp(a)intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202506291537.ZBDFCNhr-lkp@intel.com/ All warnings (new ones prefixed by >>): >> drivers/crypto/ccp/hygon/vpsp.c:589:6: warning: no previous prototype for 'vpsp_set_default_vid_permission' [-Wmissing-prototypes] 589 | void vpsp_set_default_vid_permission(uint32_t is_allow) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >> drivers/crypto/ccp/hygon/vpsp.c:1055:5: warning: no previous prototype for 'vpsp_do_cmd' [-Wmissing-prototypes] 1055 | int vpsp_do_cmd(int cmd, phys_addr_t phy_addr, int *psp_ret) | ^~~~~~~~~~~ Kconfig warnings: (for reference only) WARNING: unmet direct dependencies detected for ACPI_HOTPLUG_IGNORE_OSC Depends on [n]: ACPI [=y] && ACPI_HOTPLUG_CPU [=n] Selected by [y]: - X86 [=y] && ACPI [=y] && HOTPLUG_CPU [=y] vim +/vpsp_set_default_vid_permission +589 drivers/crypto/ccp/hygon/vpsp.c 582 583 /** 584 * When 'allow_default_vid' is set to 1, 585 * QEMU is allowed to use 'vid 0' by default 586 * in the absence of a valid 'vid' setting. 587 */ 588 uint32_t allow_default_vid = 1; > 589 void vpsp_set_default_vid_permission(uint32_t is_allow) 590 { 591 allow_default_vid = is_allow; 592 } 593 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki
1 0
0 0
[openeuler:OLK-5.10 2985/2985] drivers/net/ipvlan/ipvlan_main.c:431:19: warning: variable 'old_prog' set but not used
by kernel test robot 29 Jun '25

29 Jun '25
tree: https://gitee.com/openeuler/kernel.git OLK-5.10 head: c245365237da527fb423d85e7ec54648113f843d commit: 373ce97bdbb6378acf984656798aff4bb706a447 [2985/2985] ipvlan: support use xdp native mode config: x86_64-rhel-9.4-rust (https://download.01.org/0day-ci/archive/20250629/202506291521.HeG05IiC-lkp@…) compiler: clang version 18.1.8 (https://github.com/llvm/llvm-project 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff) rustc: rustc 1.58.0 (02072b482 2022-01-11) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250629/202506291521.HeG05IiC-lkp@…) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp(a)intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202506291521.HeG05IiC-lkp@intel.com/ All warnings (new ones prefixed by >>): >> drivers/net/ipvlan/ipvlan_main.c:431:19: warning: variable 'old_prog' set but not used [-Wunused-but-set-variable] 431 | struct bpf_prog *old_prog; | ^ 1 warning generated. vim +/old_prog +431 drivers/net/ipvlan/ipvlan_main.c 426 427 static int ipvlan_xdp_set(struct net_device *dev, struct bpf_prog *prog, 428 struct netlink_ext_ack *extack) 429 { 430 struct ipvl_dev *priv = netdev_priv(dev); > 431 struct bpf_prog *old_prog; 432 433 old_prog = rtnl_dereference(priv->xdp_prog); 434 rcu_assign_pointer(priv->xdp_prog, prog); 435 return 0; 436 } 437 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki
1 0
0 0
[PATCH OLK-6.6] LeapIOraid: add device and support fw log
by haodongdong 29 Jun '25

29 Jun '25
LeapIO inclusion category: feature bugzilla: https://gitee.com/openeuler/kernel/issues/ICIKQI ------------------------------------------ add device and support fw log Signed-off-by: haodongdong <doubled(a)leap-io.com> --- drivers/scsi/leapioraid/leapioraid_app.c | 28 +++++++ drivers/scsi/leapioraid/leapioraid_func.c | 79 +++++++------------ drivers/scsi/leapioraid/leapioraid_func.h | 6 +- drivers/scsi/leapioraid/leapioraid_os.c | 2 + .../scsi/leapioraid/leapioraid_transport.c | 8 +- 5 files changed, 69 insertions(+), 54 deletions(-) diff --git a/drivers/scsi/leapioraid/leapioraid_app.c b/drivers/scsi/leapioraid/leapioraid_app.c index 6e7f6bf877782..039b4d8ffd027 100644 --- a/drivers/scsi/leapioraid/leapioraid_app.c +++ b/drivers/scsi/leapioraid/leapioraid_app.c @@ -2188,6 +2188,33 @@ const struct attribute_group *leapioraid_dev_groups[] = { NULL }; +static int my_mmap(struct file *filp, struct vm_area_struct *vma) +{ + struct LEAPIORAID_ADAPTER *ioc; + unsigned long pfn; + unsigned long length = vma->vm_end - vma->vm_start; + + ioc = list_first_entry(&leapioraid_ioc_list, + struct LEAPIORAID_ADAPTER, list); + if (length > (SYS_LOG_BUF_SIZE + SYS_LOG_BUF_RESERVE)) { + pr_err("Requested mapping size is too large\n"); + return -EINVAL; + } + if (ioc->log_buffer == NULL) { + pr_err("no log buffer\n"); + return -EINVAL; + } + + pfn = virt_to_phys(ioc->log_buffer) >> PAGE_SHIFT; + + if (remap_pfn_range(vma, vma->vm_start, pfn, length, vma->vm_page_prot)) { + pr_err("Failed to map memory to user space\n"); + return -EAGAIN; + } + + return 0; +} + static const struct file_operations leapioraid_ctl_fops = { .owner = THIS_MODULE, @@ -2197,6 +2224,7 @@ file_operations leapioraid_ctl_fops = { #ifdef CONFIG_COMPAT .compat_ioctl = leapioraid_ctl_ioctl_compat, #endif + .mmap = my_mmap, }; static struct miscdevice leapioraid_ctl_dev = { diff --git a/drivers/scsi/leapioraid/leapioraid_func.c b/drivers/scsi/leapioraid/leapioraid_func.c index 97e0f893ab4c5..19fe5e96a9add 100644 --- a/drivers/scsi/leapioraid/leapioraid_func.c +++ b/drivers/scsi/leapioraid/leapioraid_func.c @@ -315,66 +315,38 @@ leapioraid_udp_exit(void) sock_release(sock); } -static int -leapioraid_send_udp_pkg(void *buf, U32 datasize) +struct info { - int ret; - struct kvec vec; - - vec.iov_len = datasize; - vec.iov_base = buf; - ret = kernel_sendmsg(sock, &msg, &vec, 1, vec.iov_len); - if (ret <= 0) { - pr_err_ratelimited("Sending UDP packet failed: errorno = %d", - ret); - return 0; - } else { - return ret; - } -} + u32 user_position; + u32 ioc_position; +}; +int cooo; static void leapioraid_base_pcie_log_work(struct work_struct *work) { struct LEAPIORAID_ADAPTER *ioc = - container_of(work, struct LEAPIORAID_ADAPTER, pcie_log_work.work); + container_of(work, + struct LEAPIORAID_ADAPTER, pcie_log_work.work); unsigned long flags; - u32 host_logbuf_position, ioc_logbuf_position; - u32 datasize, offset, send_sz, actual_send_sz; - - while (true) { - host_logbuf_position = - ioc->base_readl(&ioc->chip->HostLogBufPosition, 0); - ioc_logbuf_position = - ioc->base_readl(&ioc->chip->IocLogBufPosition, 0); - datasize = ioc_logbuf_position - host_logbuf_position; - offset = host_logbuf_position % SYS_LOG_BUF_SIZE; - if (datasize == 0) { - goto rearm_timer; - } else if (datasize > SYS_LOG_BUF_SIZE) { - pr_err("log thread error:data size overflow\n"); - return; - } + struct info *infom = (struct info *)(ioc->log_buffer + SYS_LOG_BUF_SIZE); - if (offset + datasize > SYS_LOG_BUF_SIZE) - send_sz = SYS_LOG_BUF_SIZE - offset; - else - send_sz = datasize; + if (cooo == 0) { + infom->user_position = + ioc->base_readl(&ioc->chip->HostLogBufPosition, 0); + infom->ioc_position = + ioc->base_readl(&ioc->chip->IocLogBufPosition, 0); + cooo++; + } - if (send_sz > MAX_UPD_PAYLOAD_SZ) - send_sz = MAX_UPD_PAYLOAD_SZ; + writel(infom->user_position, &ioc->chip->HostLogBufPosition); + infom->ioc_position = ioc->base_readl(&ioc->chip->IocLogBufPosition, 0); - actual_send_sz = - leapioraid_send_udp_pkg(ioc->log_buffer + offset, send_sz); - host_logbuf_position += actual_send_sz; - writel(host_logbuf_position, &ioc->chip->HostLogBufPosition); - } -rearm_timer: spin_lock_irqsave(&ioc->ioc_reset_in_progress_lock, flags); if (ioc->pcie_log_work_q) queue_delayed_work(ioc->pcie_log_work_q, - &ioc->pcie_log_work, - msecs_to_jiffies(LEAPIORAID_LOG_POLLING_INTERVAL)); + &ioc->pcie_log_work, + msecs_to_jiffies(LEAPIORAID_LOG_POLLING_INTERVAL)); spin_unlock_irqrestore(&ioc->ioc_reset_in_progress_lock, flags); } @@ -4786,9 +4758,18 @@ leapioraid_base_trace_log_init(struct LEAPIORAID_ADAPTER *ioc) pr_info("%s %s\n", ioc->name, __func__)); if (ioc->log_buffer == NULL) { ioc->log_buffer = - dma_alloc_coherent(&ioc->pdev->dev, SYS_LOG_BUF_SIZE, - &ioc->log_buffer_dma, GFP_KERNEL); + dma_alloc_coherent(&ioc->pdev->dev, + (SYS_LOG_BUF_SIZE + SYS_LOG_BUF_RESERVE), + &ioc->log_buffer_dma, GFP_KERNEL); + if (!ioc->log_buffer) { + pr_err("%s: Failed to allocate log_buffer at %s:%d/%s()!\n", + ioc->name, __FILE__, __LINE__, __func__); + return -ENOMEM; + } + } + memset(ioc->log_buffer, 0, (SYS_LOG_BUF_SIZE + SYS_LOG_BUF_RESERVE)); + memset(&mpi_request, 0, sizeof(struct LeapioraidIOCLogReq_t)); mpi_request.Function = LEAPIORAID_FUNC_LOG_INIT; mpi_request.BufAddr = ioc->log_buffer_dma; diff --git a/drivers/scsi/leapioraid/leapioraid_func.h b/drivers/scsi/leapioraid/leapioraid_func.h index 76babcb40766c..a4beb1412d666 100644 --- a/drivers/scsi/leapioraid/leapioraid_func.h +++ b/drivers/scsi/leapioraid/leapioraid_func.h @@ -61,7 +61,9 @@ #define fallthrough #endif -#define SYS_LOG_BUF_SIZE (0x20000) +#define SYS_LOG_BUF_SIZE (0x200000) //2M +#define SYS_LOG_BUF_RESERVE (0x1000) //256 + #define MAX_UPD_PAYLOAD_SZ (0x4000) #define LEAPIORAID_DRIVER_NAME "LeapIoRaid" @@ -76,6 +78,8 @@ #define LEAPIORAID_VENDOR_ID (0xD405) #define LEAPIORAID_DEVICE_ID_1 (0x1000) #define LEAPIORAID_DEVICE_ID_2 (0x1001) +#define LEAPIORAID_HBA (0x8200) +#define LEAPIORAID_RAID (0x8201) #define LEAPIORAID_MAX_PHYS_SEGMENTS SG_CHUNK_SIZE diff --git a/drivers/scsi/leapioraid/leapioraid_os.c b/drivers/scsi/leapioraid/leapioraid_os.c index 368a3c859a04b..bb3ef15dec0a2 100644 --- a/drivers/scsi/leapioraid/leapioraid_os.c +++ b/drivers/scsi/leapioraid/leapioraid_os.c @@ -9685,6 +9685,8 @@ static const struct pci_device_id leapioraid_pci_table[] = { { 0x1556, 0x1111, PCI_ANY_ID, PCI_ANY_ID }, { LEAPIORAID_VENDOR_ID, LEAPIORAID_DEVICE_ID_1, PCI_ANY_ID, PCI_ANY_ID }, { LEAPIORAID_VENDOR_ID, LEAPIORAID_DEVICE_ID_2, PCI_ANY_ID, PCI_ANY_ID }, + { LEAPIORAID_VENDOR_ID, LEAPIORAID_HBA, PCI_ANY_ID, PCI_ANY_ID }, + { LEAPIORAID_VENDOR_ID, LEAPIORAID_RAID, PCI_ANY_ID, PCI_ANY_ID }, { 0 } }; diff --git a/drivers/scsi/leapioraid/leapioraid_transport.c b/drivers/scsi/leapioraid/leapioraid_transport.c index e7ff263a8b6e7..edddd56128a19 100644 --- a/drivers/scsi/leapioraid/leapioraid_transport.c +++ b/drivers/scsi/leapioraid/leapioraid_transport.c @@ -852,8 +852,8 @@ leapioraid_transport_port_remove(struct LEAPIORAID_ADAPTER *ioc, list_for_each_entry_safe(leapioraid_phy, next_phy, &leapioraid_port->phy_list, port_siblings) { if ((ioc->logging_level & LEAPIORAID_DEBUG_TRANSPORT)) - dev_info(&leapioraid_port->port->dev, - "remove: sas_addr(0x%016llx), phy(%d)\n", + pr_info("%s %s: remove: sas_addr(0x%016llx), phy(%d)\n", + ioc->name, __func__, (unsigned long long) leapioraid_port->remote_identify.sas_address, leapioraid_phy->phy_id); @@ -869,8 +869,8 @@ leapioraid_transport_port_remove(struct LEAPIORAID_ADAPTER *ioc, ioc->name, __func__, (unsigned long long)sas_address); #else if ((ioc->logging_level & LEAPIORAID_DEBUG_TRANSPORT)) - dev_info(&leapioraid_port->rphy->dev, - "remove: sas_addr(0x%016llx)\n", + pr_info("%s %s: remove: sas_addr(0x%016llx)\n", + ioc->name, __func__, (unsigned long long)sas_address); if (!ioc->remove_host) sas_rphy_delete(leapioraid_port->rphy); -- 2.25.1
2 1
0 0
[openeuler:OLK-6.6 2411/2411] drivers/crypto/ccp/hygon/psp-dev.c:25:10: warning: no previous prototype for 'atomic64_exchange'
by kernel test robot 29 Jun '25

29 Jun '25
tree: https://gitee.com/openeuler/kernel.git OLK-6.6 head: c02455c4cce8052f74fc11c09e9073c01c7f33a4 commit: fe08767e3a083e73a72f08432bc6fbd864fa7179 [2411/2411] drivers/crypto/ccp: concurrent psp access support between user and kernel space config: x86_64-buildonly-randconfig-2001-20250626 (https://download.01.org/0day-ci/archive/20250629/202506291256.D2SqWOXZ-lkp@…) compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250629/202506291256.D2SqWOXZ-lkp@…) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp(a)intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202506291256.D2SqWOXZ-lkp@intel.com/ All warnings (new ones prefixed by >>): >> drivers/crypto/ccp/hygon/psp-dev.c:25:10: warning: no previous prototype for 'atomic64_exchange' [-Wmissing-prototypes] 25 | uint64_t atomic64_exchange(uint64_t *dst, uint64_t val) | ^~~~~~~~~~~~~~~~~ >> drivers/crypto/ccp/hygon/psp-dev.c:30:5: warning: no previous prototype for 'psp_mutex_init' [-Wmissing-prototypes] 30 | int psp_mutex_init(struct psp_mutex *mutex) | ^~~~~~~~~~~~~~ drivers/crypto/ccp/hygon/psp-dev.c:38:5: warning: no previous prototype for 'psp_mutex_trylock' [-Wmissing-prototypes] 38 | int psp_mutex_trylock(struct psp_mutex *mutex) | ^~~~~~~~~~~~~~~~~ Kconfig warnings: (for reference only) WARNING: unmet direct dependencies detected for ACPI_HOTPLUG_IGNORE_OSC Depends on [n]: ACPI [=y] && ACPI_HOTPLUG_CPU [=n] Selected by [y]: - X86 [=y] && ACPI [=y] && HOTPLUG_CPU [=y] vim +/atomic64_exchange +25 drivers/crypto/ccp/hygon/psp-dev.c 24 > 25 uint64_t atomic64_exchange(uint64_t *dst, uint64_t val) 26 { 27 return xchg(dst, val); 28 } 29 > 30 int psp_mutex_init(struct psp_mutex *mutex) 31 { 32 if (!mutex) 33 return -1; 34 mutex->locked = 0; 35 return 0; 36 } 37 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki
1 0
0 0
[openeuler:OLK-5.10 2985/2985] drivers/acpi/numa/hmat.c:726:6: warning: no previous prototype for function 'hmat_restore_target'
by kernel test robot 29 Jun '25

29 Jun '25
tree: https://gitee.com/openeuler/kernel.git OLK-5.10 head: c245365237da527fb423d85e7ec54648113f843d commit: 2e1b00fcf1e3152a1e73846f5f9ec37cef088a65 [2985/2985] ACPI/HMAT: Add missing locality information for hot-added device config: x86_64-rhel-9.4-rust (https://download.01.org/0day-ci/archive/20250629/202506291239.arFZDGuj-lkp@…) compiler: clang version 18.1.8 (https://github.com/llvm/llvm-project 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff) rustc: rustc 1.58.0 (02072b482 2022-01-11) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250629/202506291239.arFZDGuj-lkp@…) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp(a)intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202506291239.arFZDGuj-lkp@intel.com/ All warnings (new ones prefixed by >>): >> drivers/acpi/numa/hmat.c:726:6: warning: no previous prototype for function 'hmat_restore_target' [-Wmissing-prototypes] 726 | void hmat_restore_target(int nid) | ^ drivers/acpi/numa/hmat.c:726:1: note: declare 'static' if the function is not intended to be used outside of this translation unit 726 | void hmat_restore_target(int nid) | ^ | static 1 warning generated. vim +/hmat_restore_target +726 drivers/acpi/numa/hmat.c 725 > 726 void hmat_restore_target(int nid) 727 { 728 struct memory_target *target; 729 int pxm; 730 731 pxm = node_to_pxm(nid); 732 target = find_mem_target(pxm); 733 if (!target) 734 return; 735 736 mutex_lock(&target_lock); 737 hmat_register_target_cache(target); 738 hmat_register_target_perf(target, 0); 739 hmat_register_target_perf(target, 1); 740 mutex_unlock(&target_lock); 741 } 742 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki
1 0
0 0
[openeuler:OLK-6.6 2411/2411] drivers/crypto/ccp/hygon/tdm-kernel-guard.c:151:5: warning: no previous prototype for 'tdm_service_run'
by kernel test robot 29 Jun '25

29 Jun '25
tree: https://gitee.com/openeuler/kernel.git OLK-6.6 head: c02455c4cce8052f74fc11c09e9073c01c7f33a4 commit: 3ad98583441f7c8a2553e1e8d6340ed4397033e2 [2411/2411] crypto: tdm: Support dynamic protection for SCT and IDT by HYGON TDM config: x86_64-buildonly-randconfig-2001-20250626 (https://download.01.org/0day-ci/archive/20250629/202506291019.RJatdUXf-lkp@…) compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250629/202506291019.RJatdUXf-lkp@…) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp(a)intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202506291019.RJatdUXf-lkp@intel.com/ All warnings (new ones prefixed by >>): >> drivers/crypto/ccp/hygon/tdm-kernel-guard.c:151:5: warning: no previous prototype for 'tdm_service_run' [-Wmissing-prototypes] 151 | int tdm_service_run(struct tdm_security_enhance *data) | ^~~~~~~~~~~~~~~ >> drivers/crypto/ccp/hygon/tdm-kernel-guard.c:212:5: warning: no previous prototype for 'tdm_service_exit' [-Wmissing-prototypes] 212 | int tdm_service_exit(struct tdm_security_enhance *data) | ^~~~~~~~~~~~~~~~ Kconfig warnings: (for reference only) WARNING: unmet direct dependencies detected for ACPI_HOTPLUG_IGNORE_OSC Depends on [n]: ACPI [=y] && ACPI_HOTPLUG_CPU [=n] Selected by [y]: - X86 [=y] && ACPI [=y] && HOTPLUG_CPU [=y] vim +/tdm_service_run +151 drivers/crypto/ccp/hygon/tdm-kernel-guard.c 150 > 151 int tdm_service_run(struct tdm_security_enhance *data) 152 { 153 int ret = 0; 154 struct addr_range_info *addr_range = NULL; 155 156 // Allocate memory for addr_range 157 addr_range = kzalloc(sizeof(struct addr_range_info) + sizeof(struct addr_info), GFP_KERNEL); 158 if (!addr_range) { 159 ret = -DYN_ERR_MEM; 160 pr_err("addr_range kzalloc memory failed\n"); 161 goto end; 162 } 163 164 // Fill in addr_range 165 addr_range->count = 1; 166 addr_range->addr[0].addr_start = data->vaddr; 167 addr_range->addr[0].length = data->size; 168 data->mem_range = addr_range; 169 170 // Context configuration 171 data->context |= TASK_CREATE_VADDR; 172 173 // Allocate memory for authcode 174 data->authcode = kzalloc(sizeof(struct authcode_2b) + AUTHCODE_MAX, GFP_KERNEL); 175 if (!data->authcode) { 176 ret = -DYN_ERR_MEM; 177 pr_err("authcode_2b kzalloc memory failed\n"); 178 goto free_addr_range_info; 179 } 180 181 data->authcode->len = AUTHCODE_MAX; 182 183 // Measurement data configuration 184 data->mdata.hash_algo = HASH_ALGO_SM3; 185 data->mdata.period_ms = 0; 186 ret = calc_expected_hash((uint8_t *)data->vaddr, data->size, 187 data->mdata.expected_measurement); 188 if (ret) { 189 pr_err("calculate expected hash failed!\n"); 190 goto free_authcode; 191 } 192 193 // Create and start tdm task 194 ret = tdm_task_create_and_run(data); 195 if (ret) { 196 pr_err("tdm_task_create_and_run failed!\n"); 197 goto free_authcode; 198 } 199 200 return ret; 201 202 free_authcode: 203 kfree(data->authcode); 204 data->authcode = NULL; 205 free_addr_range_info: 206 kfree(data->mem_range); 207 data->mem_range = NULL; 208 end: 209 return ret; 210 } 211 > 212 int tdm_service_exit(struct tdm_security_enhance *data) 213 { 214 int ret = 0; 215 int task_status = 0; 216 217 task_status = psp_startstop_measure_task(data->task_id, data->authcode, false); 218 if (task_status < 0) { 219 ret = task_status; 220 pr_err("task_id %d stop failed with 0x%x\n", data->task_id, ret); 221 goto end; 222 } 223 224 // Waiting for the task to end 225 msleep(40); 226 227 psp_destroy_measure_task(data->task_id, data->authcode); 228 229 kfree(data->authcode); 230 data->authcode = NULL; 231 kfree(data->mem_range); 232 data->mem_range = NULL; 233 end: 234 return ret; 235 } 236 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki
1 0
0 0
[openeuler:OLK-6.6 2411/2411] arch/x86/kernel/cpu/proc.c:63:5: warning: no previous prototype for function 'show_cpuinfo'
by kernel test robot 29 Jun '25

29 Jun '25
tree: https://gitee.com/openeuler/kernel.git OLK-6.6 head: c02455c4cce8052f74fc11c09e9073c01c7f33a4 commit: 9d3b0e8891b8b3450a7cd6d1367946a1c69e4eb9 [2411/2411] bpf: Add cpuinfo_x86 iterator target config: x86_64-rhel-9.4-rust (https://download.01.org/0day-ci/archive/20250629/202506290625.yOv5HOMH-lkp@…) compiler: clang version 18.1.8 (https://github.com/llvm/llvm-project 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff) rustc: rustc 1.73.0 (cc66ad468 2023-10-03) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250629/202506290625.yOv5HOMH-lkp@…) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp(a)intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202506290625.yOv5HOMH-lkp@intel.com/ All warnings (new ones prefixed by >>): >> arch/x86/kernel/cpu/proc.c:63:5: warning: no previous prototype for function 'show_cpuinfo' [-Wmissing-prototypes] 63 | int show_cpuinfo(struct seq_file *m, void *v) | ^ arch/x86/kernel/cpu/proc.c:63:1: note: declare 'static' if the function is not intended to be used outside of this translation unit 63 | int show_cpuinfo(struct seq_file *m, void *v) | ^ | static 1 warning generated. vim +/show_cpuinfo +63 arch/x86/kernel/cpu/proc.c 62 > 63 int show_cpuinfo(struct seq_file *m, void *v) 64 { 65 struct cpuinfo_x86 *c = v; 66 unsigned int cpu; 67 int i; 68 69 cpu = c->cpu_index; 70 seq_printf(m, "processor\t: %u\n" 71 "vendor_id\t: %s\n" 72 "cpu family\t: %d\n" 73 "model\t\t: %u\n" 74 "model name\t: %s\n", 75 cpu, 76 c->x86_vendor_id[0] ? c->x86_vendor_id : "unknown", 77 c->x86, 78 c->x86_model, 79 c->x86_model_id[0] ? c->x86_model_id : "unknown"); 80 81 if (c->x86_stepping || c->cpuid_level >= 0) 82 seq_printf(m, "stepping\t: %d\n", c->x86_stepping); 83 else 84 seq_puts(m, "stepping\t: unknown\n"); 85 if (c->microcode) 86 seq_printf(m, "microcode\t: 0x%x\n", c->microcode); 87 88 if (cpu_has(c, X86_FEATURE_TSC)) { 89 unsigned int freq = arch_freq_get_on_cpu(cpu); 90 91 seq_printf(m, "cpu MHz\t\t: %u.%03u\n", freq / 1000, (freq % 1000)); 92 } 93 94 /* Cache size */ 95 if (c->x86_cache_size) 96 seq_printf(m, "cache size\t: %u KB\n", c->x86_cache_size); 97 98 show_cpuinfo_core(m, c, cpu); 99 show_cpuinfo_misc(m, c); 100 101 seq_puts(m, "flags\t\t:"); 102 for (i = 0; i < 32*NCAPINTS; i++) 103 if (cpu_has(c, i) && x86_cap_flags[i] != NULL) { 104 if (c->x86_vendor == X86_VENDOR_HYGON) 105 seq_printf(m, " %s", i == X86_FEATURE_SEV ? "csv" : 106 (i == X86_FEATURE_SEV_ES ? "csv2" : 107 x86_cap_flags[i])); 108 else 109 seq_printf(m, " %s", x86_cap_flags[i]); 110 } 111 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki
1 0
0 0
[openeuler:OLK-6.6 2411/2411] fs/nfs/dir.c:1498:6: warning: no previous prototype for function 'nfs_check_have_lookup_cache_flag'
by kernel test robot 29 Jun '25

29 Jun '25
tree: https://gitee.com/openeuler/kernel.git OLK-6.6 head: c02455c4cce8052f74fc11c09e9073c01c7f33a4 commit: 18e360871c3f648ecb0d8cc9b23fd4268a64c17f [2411/2411] add enfs feature config: x86_64-rhel-9.4-rust (https://download.01.org/0day-ci/archive/20250629/202506290538.Adg4qVrg-lkp@…) compiler: clang version 18.1.8 (https://github.com/llvm/llvm-project 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff) rustc: rustc 1.73.0 (cc66ad468 2023-10-03) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250629/202506290538.Adg4qVrg-lkp@…) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp(a)intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202506290538.Adg4qVrg-lkp@intel.com/ All warnings (new ones prefixed by >>): >> fs/nfs/dir.c:1498:6: warning: no previous prototype for function 'nfs_check_have_lookup_cache_flag' [-Wmissing-prototypes] 1498 | bool nfs_check_have_lookup_cache_flag(struct nfs_server *server, int flag) | ^ fs/nfs/dir.c:1498:1: note: declare 'static' if the function is not intended to be used outside of this translation unit 1498 | bool nfs_check_have_lookup_cache_flag(struct nfs_server *server, int flag) | ^ | static 1 warning generated. vim +/nfs_check_have_lookup_cache_flag +1498 fs/nfs/dir.c 1497 > 1498 bool nfs_check_have_lookup_cache_flag(struct nfs_server *server, int flag) 1499 { 1500 #if IS_ENABLED(CONFIG_ENFS) 1501 return enfs_check_have_lookup_cache_flag(server, flag); 1502 #else 1503 return (server->flags & NFS_MOUNT_LOOKUP_CACHE_NONE); 1504 #endif 1505 } 1506 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki
1 0
0 0
[openeuler:OLK-5.10 2985/2985] mm/damon/core-test.h:284:2: warning: comparison of distinct pointer types ('typeof (__left) *' (aka 'unsigned int *') and 'typeof (__right) *' (aka 'int *'))
by kernel test robot 29 Jun '25

29 Jun '25
tree: https://gitee.com/openeuler/kernel.git OLK-5.10 head: c245365237da527fb423d85e7ec54648113f843d commit: 83b931be40b2829e20f38356509d8706ea6b6238 [2985/2985] mm/damon/core-test: test damon_set_regions config: x86_64-buildonly-randconfig-2004-20250626 (https://download.01.org/0day-ci/archive/20250629/202506290458.MrAi1kVI-lkp@…) compiler: clang version 20.1.7 (https://github.com/llvm/llvm-project 6146a88f60492b520a36f8f8f3231e15f3cc6082) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250629/202506290458.MrAi1kVI-lkp@…) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp(a)intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202506290458.MrAi1kVI-lkp@intel.com/ All warnings (new ones prefixed by >>): In file included from mm/damon/core.c:1248: >> mm/damon/core-test.h:284:2: warning: comparison of distinct pointer types ('typeof (__left) *' (aka 'unsigned int *') and 'typeof (__right) *' (aka 'int *')) [-Wcompare-distinct-pointer-types] 284 | KUNIT_EXPECT_EQ(test, damon_nr_regions(t), 3); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/kunit/test.h:1234:2: note: expanded from macro 'KUNIT_EXPECT_EQ' 1234 | KUNIT_BINARY_EQ_ASSERTION(test, KUNIT_EXPECTATION, left, right) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/kunit/test.h:871:2: note: expanded from macro 'KUNIT_BINARY_EQ_ASSERTION' 871 | KUNIT_BINARY_EQ_MSG_ASSERTION(test, \ | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 872 | assert_type, \ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 873 | left, \ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 874 | right, \ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 875 | NULL) | ~~~~~ include/kunit/test.h:861:2: note: expanded from macro 'KUNIT_BINARY_EQ_MSG_ASSERTION' 861 | KUNIT_BASE_EQ_MSG_ASSERTION(test, \ | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 862 | kunit_binary_assert, \ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 863 | KUNIT_INIT_BINARY_ASSERT_STRUCT, \ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 864 | assert_type, \ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 865 | left, \ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 866 | right, \ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 867 | fmt, \ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 868 | ##__VA_ARGS__) | ~~~~~~~~~~~~~~ include/kunit/test.h:772:2: note: expanded from macro 'KUNIT_BASE_EQ_MSG_ASSERTION' 772 | KUNIT_BASE_BINARY_ASSERTION(test, \ | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 773 | assert_class, \ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 774 | ASSERT_CLASS_INIT, \ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 775 | assert_type, \ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 776 | left, ==, right, \ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 777 | fmt, \ | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 778 | ##__VA_ARGS__) | ~~~~~~~~~~~~~~ include/kunit/test.h:748:9: note: expanded from macro 'KUNIT_BASE_BINARY_ASSERTION' 748 | ((void)__typecheck(__left, __right)); \ | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~ include/linux/minmax.h:20:28: note: expanded from macro '__typecheck' 20 | (!!(sizeof((typeof(x) *)1 == (typeof(y) *)1))) | ~~~~~~~~~~~~~~ ^ ~~~~~~~~~~~~~~ 1 warning generated. vim +284 mm/damon/core-test.h 269 270 static void damon_test_set_regions(struct kunit *test) 271 { 272 struct damon_target *t = damon_new_target(); 273 struct damon_region *r1 = damon_new_region(4, 16); 274 struct damon_region *r2 = damon_new_region(24, 32); 275 struct damon_addr_range range = {.start = 8, .end = 28}; 276 unsigned long expects[] = {8, 16, 16, 24, 24, 28}; 277 int expect_idx = 0; 278 struct damon_region *r; 279 280 damon_add_region(r1, t); 281 damon_add_region(r2, t); 282 damon_set_regions(t, &range, 1); 283 > 284 KUNIT_EXPECT_EQ(test, damon_nr_regions(t), 3); 285 damon_for_each_region(r, t) { 286 KUNIT_EXPECT_EQ(test, r->ar.start, expects[expect_idx++]); 287 KUNIT_EXPECT_EQ(test, r->ar.end, expects[expect_idx++]); 288 } 289 damon_destroy_target(t); 290 } 291 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki
1 0
0 0
[openeuler:OLK-5.10 2985/2985] kernel/watchdog_hld.c:502:12: warning: no previous prototype for function '__hardlockup_detector_perf_init'
by kernel test robot 29 Jun '25

29 Jun '25
tree: https://gitee.com/openeuler/kernel.git OLK-5.10 head: c245365237da527fb423d85e7ec54648113f843d commit: 364de98eacea8dbfe4f926f62085aebf8534f403 [2985/2985] watchdog: Fix sleeping function called from atomic context config: x86_64-buildonly-randconfig-2004-20250626 (https://download.01.org/0day-ci/archive/20250629/202506290345.5mLGiKER-lkp@…) compiler: clang version 20.1.7 (https://github.com/llvm/llvm-project 6146a88f60492b520a36f8f8f3231e15f3cc6082) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20250629/202506290345.5mLGiKER-lkp@…) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp(a)intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202506290345.5mLGiKER-lkp@intel.com/ All warnings (new ones prefixed by >>): >> kernel/watchdog_hld.c:502:12: warning: no previous prototype for function '__hardlockup_detector_perf_init' [-Wmissing-prototypes] 502 | int __init __hardlockup_detector_perf_init(void *not_used) | ^ kernel/watchdog_hld.c:502:1: note: declare 'static' if the function is not intended to be used outside of this translation unit 502 | int __init __hardlockup_detector_perf_init(void *not_used) | ^ | static 1 warning generated. vim +/__hardlockup_detector_perf_init +502 kernel/watchdog_hld.c 501 > 502 int __init __hardlockup_detector_perf_init(void *not_used) 503 { 504 int ret = hardlockup_detector_event_create(); 505 506 if (ret) { 507 pr_info("Perf NMI watchdog permanently disabled\n"); 508 } else { 509 perf_event_release_kernel(this_cpu_read(watchdog_ev)); 510 this_cpu_write(watchdog_ev, NULL); 511 } 512 return ret; 513 } 514 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki
1 0
0 0
  • ← Newer
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  • 1887
  • Older →

HyperKitty Powered by HyperKitty