Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp61569img; Sun, 17 Mar 2019 20:26:42 -0700 (PDT) X-Google-Smtp-Source: APXvYqwySZOdvlUG3+pT8JjFZK50xLORoTFXARXM84yAnGaKtfBgRWw1TX0AFnlXOGpfBNktFaXM X-Received: by 2002:a62:3107:: with SMTP id x7mr16827660pfx.191.1552879602862; Sun, 17 Mar 2019 20:26:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552879602; cv=none; d=google.com; s=arc-20160816; b=FEceynyCpRMwExqGNi/YCT8TgF2YE22qlrOci0LkWgyCCtABBzEgYtfuYIgxuFXsRd udRaDWxGiabcMbM8j/ITVbWEy6vBGaq8yNyo7KfwdnGvqaDmehLBDD36lPYQl+UDH2Dj C17Ixx/ZYCwzcW3S2F3mlKzfHtFwXSpStV3nCIiV8pLzhk4ONgLL1jU77qcp4EqWmRs/ kzzagyM/rtAqaCkWF9OoV7aj+iUQKGfXTU2zYN9uB2c47Zi/l86aaVApnVC8fH5vd0sb ZvSNOLek+w5ziXURt36p3VjaAPjpM4oZz1ZSVR6e60AprdQrH629ZyiAySs0QSmhKCGi AwlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=7p//1PR5F/sgyDj76MSBQjRYE5FlynCqfv62Ie5Gow8=; b=Jq5P8ycWSG0J2CIC6XWFnN6qAaomLPLUnl2fsMHqBunlvTMnNjdX2iQXDtZJLvEhpi 6OOhYOhEWyyo9WPOJxuuK5syo8J7LhFQehZ5+gFZOPiRTXnVZmm1nfx+R8R+A7sJJRRF FeWVguhFctoWEZjndFO1ArE465YLdgd2G6xaWhqvjKZGIiP9AXIlq+iB0tMe2rIuzC5g jrm6vvCJFJ/mMUk6T/9VSqhUgBIJ+L7IdFMn1bJ0OLsgxrlG7BAuFPQjzACNopj3UKj4 Z/FrCx6l63cneUsKvIjOkC+9VkpfHOmaNAo/X4kd7VPIfY6qkSwkdIzY6s4ZWDe4e5l+ p04g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=cn59wRrA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l16si8222594pgg.459.2019.03.17.20.26.16; Sun, 17 Mar 2019 20:26:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=cn59wRrA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727808AbfCRDXD (ORCPT + 99 others); Sun, 17 Mar 2019 23:23:03 -0400 Received: from mail-pf1-f194.google.com ([209.85.210.194]:35699 "EHLO mail-pf1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727699AbfCRDXD (ORCPT ); Sun, 17 Mar 2019 23:23:03 -0400 Received: by mail-pf1-f194.google.com with SMTP id j5so10300746pfa.2; Sun, 17 Mar 2019 20:23:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=7p//1PR5F/sgyDj76MSBQjRYE5FlynCqfv62Ie5Gow8=; b=cn59wRrAp5A+zB8KgE+uWFKMDkFIDNuj5W9La9KiX3AWNv0YbpN4J28/uT3K90s14W kQyOL9AAscoPfFUqRa+Kg7sTjQ0Kcje+pEx6kBGE8Qx/yY2Iqa4T7bvs3joS6CEtWA5n ohtumfXYqI6yjgZJalWSVoV/8/3v438c9wzsjDACAkW7gqQrUXvSdaH/tmAGkzFEDXvv VLeVQz+NdqlzSyB1VaIChVZr1cCRq++nk581Ni4Lxb7ZB9P/UrGnMvCE5u0hIrhy0Qav Jch/aOf0V67zX7R97cGG8p+7WexQ6E3QbKTFn/ESRSoFS1uNCUU+u0tw7TUBI9Qnf5g0 HpXg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=7p//1PR5F/sgyDj76MSBQjRYE5FlynCqfv62Ie5Gow8=; b=IMeiKhItNb0ImCaVO21WHCFDirOeoZjnkYCo9Ko+Sz1YcirOdOvQtIwj9XO+qN8GcU GPtJUdryy7TWaFRO4iVBGjuxHGqIpqmb6s27xaItL+Gl7T+Xxx8JxeMjb16ENBM/J29X ktg2C2jnJP4ICaiy0VPnI+kfVy5f0IX866HCZoL1XyGX5KoAlvvAgfMxtjNHrvJivK3J CsLgYWXXZzu5/xXeWAXZdqmBFdPYXFqgCmEzezgvuxvOJnLZ1szpz9MD7TF9eGaY3LRD SQlx6vWJUuyW4al913dx3UWbRw8QAsaZXsWc4DYc3F2D6Ly6zKfIfeLqm9eqL8TupKC8 GxNw== X-Gm-Message-State: APjAAAUAUGpsDTZhez2x4LKEyN3DsIa089L3UC2emo8IRNTnQq+rW+NV 5V1Dj6xe8Tc7uWhu1ziuhQ== X-Received: by 2002:a17:902:56a:: with SMTP id 97mr17410615plf.320.1552879381789; Sun, 17 Mar 2019 20:23:01 -0700 (PDT) Received: from localhost (2.172.220.35.bc.googleusercontent.com. [35.220.172.2]) by smtp.gmail.com with ESMTPSA id d3sm8994197pfc.125.2019.03.17.20.22.59 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Sun, 17 Mar 2019 20:23:00 -0700 (PDT) Date: Mon, 18 Mar 2019 11:22:56 +0800 From: Jacky Hu To: kbuild test robot Cc: kbuild-all@01.org, jacky.hu@walmart.com, jason.niesz@walmart.com, Wensong Zhang , Simon Horman , Julian Anastasov , "David S. Miller" , Alexey Kuznetsov , Hideaki YOSHIFUJI , Pablo Neira Ayuso , Jozsef Kadlecsik , Florian Westphal , netdev@vger.kernel.org, lvs-devel@vger.kernel.org, linux-kernel@vger.kernel.org, netfilter-devel@vger.kernel.org, coreteam@netfilter.org Subject: Re: [PATCH v4] ipvs: allow tunneling with gue encapsulation Message-ID: <20190318032256.GA21124@i716> References: <20190317155200.16586-1-hengqing.hu@gmail.com> <201903181001.7czsRhlB%lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <201903181001.7czsRhlB%lkp@intel.com> User-Agent: Mutt/1.11.4 (2019-03-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 18, 2019 at 10:10:20AM +0800, kbuild test robot wrote: > Hi Jacky, > > Thank you for the patch! Perhaps something to improve: > > [auto build test WARNING on ipvs-next/master] > [also build test WARNING on v5.1-rc1 next-20190306] > [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] > > url: https://github.com/0day-ci/linux/commits/Jacky-Hu/ipvs-allow-tunneling-with-gue-encapsulation/20190318-070156 > base: https://git.kernel.org/pub/scm/linux/kernel/git/horms/ipvs-next.git master > reproduce: > # apt-get install sparse > make ARCH=x86_64 allmodconfig > make C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' > > > sparse warnings: (new ones prefixed by >>) > > net/netfilter/ipvs/ip_vs_ctl.c:835:42: sparse: incorrect type in argument 2 (different base types) @@ expected int [signed] i @@ got restricted __be1int [signed] i @@ > net/netfilter/ipvs/ip_vs_ctl.c:835:42: expected int [signed] i > net/netfilter/ipvs/ip_vs_ctl.c:835:42: got restricted __be16 [usertype] tun_port > net/netfilter/ipvs/ip_vs_ctl.c:1197:44: sparse: expression using sizeof(void) > >> net/netfilter/ipvs/ip_vs_ctl.c:3207:37: sparse: incorrect type in argument 3 (different base types) @@ expected restricted __be16 [usertype] value @@ got e] value @@ > net/netfilter/ipvs/ip_vs_ctl.c:3207:37: expected restricted __be16 [usertype] value > net/netfilter/ipvs/ip_vs_ctl.c:3207:37: got int > net/netfilter/ipvs/ip_vs_ctl.c:1313:27: sparse: dereference of noderef expression > > vim +3207 net/netfilter/ipvs/ip_vs_ctl.c > > 3187 > 3188 static int ip_vs_genl_fill_dest(struct sk_buff *skb, struct ip_vs_dest *dest) > 3189 { > 3190 struct nlattr *nl_dest; > 3191 struct ip_vs_kstats kstats; > 3192 > 3193 nl_dest = nla_nest_start(skb, IPVS_CMD_ATTR_DEST); > 3194 if (!nl_dest) > 3195 return -EMSGSIZE; > 3196 > 3197 if (nla_put(skb, IPVS_DEST_ATTR_ADDR, sizeof(dest->addr), &dest->addr) || > 3198 nla_put_be16(skb, IPVS_DEST_ATTR_PORT, dest->port) || > 3199 nla_put_u32(skb, IPVS_DEST_ATTR_FWD_METHOD, > 3200 (atomic_read(&dest->conn_flags) & > 3201 IP_VS_CONN_F_FWD_MASK)) || > 3202 nla_put_u32(skb, IPVS_DEST_ATTR_WEIGHT, > 3203 atomic_read(&dest->weight)) || > 3204 nla_put_u8(skb, IPVS_DEST_ATTR_TUN_TYPE, > 3205 atomic_read(&dest->tun_type)) || > 3206 nla_put_be16(skb, IPVS_DEST_ATTR_TUN_PORT, > > 3207 atomic_read(&dest->tun_port)) || Should I change the type of tun_port from __be16 to u16? Looks like kbuild bugs a lot on this. > 3208 nla_put_u32(skb, IPVS_DEST_ATTR_U_THRESH, dest->u_threshold) || > 3209 nla_put_u32(skb, IPVS_DEST_ATTR_L_THRESH, dest->l_threshold) || > 3210 nla_put_u32(skb, IPVS_DEST_ATTR_ACTIVE_CONNS, > 3211 atomic_read(&dest->activeconns)) || > 3212 nla_put_u32(skb, IPVS_DEST_ATTR_INACT_CONNS, > 3213 atomic_read(&dest->inactconns)) || > 3214 nla_put_u32(skb, IPVS_DEST_ATTR_PERSIST_CONNS, > 3215 atomic_read(&dest->persistconns)) || > 3216 nla_put_u16(skb, IPVS_DEST_ATTR_ADDR_FAMILY, dest->af)) > 3217 goto nla_put_failure; > 3218 ip_vs_copy_stats(&kstats, &dest->stats); > 3219 if (ip_vs_genl_fill_stats(skb, IPVS_DEST_ATTR_STATS, &kstats)) > 3220 goto nla_put_failure; > 3221 if (ip_vs_genl_fill_stats64(skb, IPVS_DEST_ATTR_STATS64, &kstats)) > 3222 goto nla_put_failure; > 3223 > 3224 nla_nest_end(skb, nl_dest); > 3225 > 3226 return 0; > 3227 > 3228 nla_put_failure: > 3229 nla_nest_cancel(skb, nl_dest); > 3230 return -EMSGSIZE; > 3231 } > 3232 > > --- > 0-DAY kernel test infrastructure Open Source Technology Center > https://lists.01.org/pipermail/kbuild-all Intel Corporation