Re: [PATCH] mm, kasan: switch SLUB to stackdepot, enable memory quarantine for SLUB

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,

[auto build test WARNING on v4.7-rc2]
[cannot apply to next-20160608]
[if your patch is applied to the wrong git tree, please drop us a note to help improve the system]

url:    https://github.com/0day-ci/linux/commits/Alexander-Potapenko/mm-kasan-switch-SLUB-to-stackdepot-enable-memory-quarantine-for-SLUB/20160609-024216
config: m68k-m5475evb_defconfig (attached as .config)
compiler: m68k-linux-gcc (GCC) 4.9.0
reproduce:
        wget https://git.kernel.org/cgit/linux/kernel/git/wfg/lkp-tests.git/plain/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # save the attached .config to linux build tree
        make.cross ARCH=m68k 

All warnings (new ones prefixed by >>):

   mm/slub.c: In function 'calculate_sizes':
>> mm/slub.c:3357:2: warning: passing argument 2 of 'kasan_cache_create' from incompatible pointer type
     kasan_cache_create(s, &size, &s->flags);
     ^
   In file included from include/linux/slab.h:127:0,
                    from mm/slub.c:18:
   include/linux/kasan.h:91:20: note: expected 'size_t *' but argument is of type 'long unsigned int *'
    static inline void kasan_cache_create(struct kmem_cache *cache,
                       ^

vim +/kasan_cache_create +3357 mm/slub.c

  3341		if (flags & SLAB_RED_ZONE) {
  3342			/*
  3343			 * Add some empty padding so that we can catch
  3344			 * overwrites from earlier objects rather than let
  3345			 * tracking information or the free pointer be
  3346			 * corrupted if a user writes before the start
  3347			 * of the object.
  3348			 */
  3349			size += sizeof(void *);
  3350	
  3351			s->red_left_pad = sizeof(void *);
  3352			s->red_left_pad = ALIGN(s->red_left_pad, s->align);
  3353			size += s->red_left_pad;
  3354		}
  3355	#endif
  3356	
> 3357		kasan_cache_create(s, &size, &s->flags);
  3358	
  3359		/*
  3360		 * SLUB stores one object immediately after another beginning from
  3361		 * offset 0. In order to align the objects we have to simply size
  3362		 * each object to conform to the alignment.
  3363		 */
  3364		size = ALIGN(size, s->align);
  3365		s->size = size;

---
0-DAY kernel test infrastructure                Open Source Technology Center
https://lists.01.org/pipermail/kbuild-all                   Intel Corporation

Attachment: .config.gz
Description: Binary data


[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]