All of lore.kernel.org
 help / color / mirror / Atom feed
* [linux-next:master 7391/10864] kernel/bpf/verifier.c:619 mark_stack_slot_scratched() warn: should '1 << spi' be a 64 bit type?
@ 2022-01-07  8:20 ` Dan Carpenter
  0 siblings, 0 replies; 16+ messages in thread
From: kernel test robot @ 2022-01-06  0:09 UTC (permalink / raw)
  To: kbuild

[-- Attachment #1: Type: text/plain, Size: 1638 bytes --]

CC: kbuild-all(a)lists.01.org
CC: Linux Memory Management List <linux-mm@kvack.org>
TO: Christy Lee <christylee@fb.com>
CC: Alexei Starovoitov <ast@kernel.org>

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
head:   7a769a3922d81cfc74ab4d90a9cc69485f260976
commit: 0f55f9ed21f96630c6ec96805d42f92c0b458b37 [7391/10864] bpf: Only print scratched registers and stack slots to verifier logs.
:::::: branch date: 16 hours ago
:::::: commit date: 3 weeks ago
config: xtensa-randconfig-m031-20220105 (https://download.01.org/0day-ci/archive/20220106/202201060848.nagWejwv-lkp(a)intel.com/config)
compiler: xtensa-linux-gcc (GCC) 11.2.0

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>

New smatch warnings:
kernel/bpf/verifier.c:619 mark_stack_slot_scratched() warn: should '1 << spi' be a 64 bit type?

Old smatch warnings:
arch/xtensa/include/asm/thread_info.h:91 current_thread_info() warn: inconsistent indenting

vim +619 kernel/bpf/verifier.c

0f55f9ed21f9663 Christy Lee 2021-12-16  616  
0f55f9ed21f9663 Christy Lee 2021-12-16  617  static void mark_stack_slot_scratched(struct bpf_verifier_env *env, u32 spi)
0f55f9ed21f9663 Christy Lee 2021-12-16  618  {
0f55f9ed21f9663 Christy Lee 2021-12-16 @619  	env->scratched_stack_slots |= 1UL << spi;
0f55f9ed21f9663 Christy Lee 2021-12-16  620  }
0f55f9ed21f9663 Christy Lee 2021-12-16  621  

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

^ permalink raw reply	[flat|nested] 16+ messages in thread

* [linux-next:master 7391/10864] kernel/bpf/verifier.c:619 mark_stack_slot_scratched() warn: should '1 << spi' be a 64 bit type?
@ 2022-01-07  8:20 ` Dan Carpenter
  0 siblings, 0 replies; 16+ messages in thread
From: Dan Carpenter @ 2022-01-07  8:20 UTC (permalink / raw)
  To: kbuild, Christy Lee
  Cc: lkp, kbuild-all, Linux Memory Management List, Alexei Starovoitov

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
head:   7a769a3922d81cfc74ab4d90a9cc69485f260976
commit: 0f55f9ed21f96630c6ec96805d42f92c0b458b37 [7391/10864] bpf: Only print scratched registers and stack slots to verifier logs.
config: xtensa-randconfig-m031-20220105 (https://download.01.org/0day-ci/archive/20220106/202201060848.nagWejwv-lkp@intel.com/config)
compiler: xtensa-linux-gcc (GCC) 11.2.0

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>

New smatch warnings:
kernel/bpf/verifier.c:619 mark_stack_slot_scratched() warn: should '1 << spi' be a 64 bit type?

vim +619 kernel/bpf/verifier.c

0f55f9ed21f9663 Christy Lee 2021-12-16  617  static void mark_stack_slot_scratched(struct bpf_verifier_env *env, u32 spi)
0f55f9ed21f9663 Christy Lee 2021-12-16  618  {
0f55f9ed21f9663 Christy Lee 2021-12-16 @619  	env->scratched_stack_slots |= 1UL << spi;

Use 1ULL instead.

0f55f9ed21f9663 Christy Lee 2021-12-16  620  }

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org



^ permalink raw reply	[flat|nested] 16+ messages in thread

* [linux-next:master 7391/10864] kernel/bpf/verifier.c:619 mark_stack_slot_scratched() warn: should '1 << spi' be a 64 bit type?
@ 2022-01-07  8:20 ` Dan Carpenter
  0 siblings, 0 replies; 16+ messages in thread
From: Dan Carpenter @ 2022-01-07  8:20 UTC (permalink / raw)
  To: kbuild-all

[-- Attachment #1: Type: text/plain, Size: 1219 bytes --]

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
head:   7a769a3922d81cfc74ab4d90a9cc69485f260976
commit: 0f55f9ed21f96630c6ec96805d42f92c0b458b37 [7391/10864] bpf: Only print scratched registers and stack slots to verifier logs.
config: xtensa-randconfig-m031-20220105 (https://download.01.org/0day-ci/archive/20220106/202201060848.nagWejwv-lkp(a)intel.com/config)
compiler: xtensa-linux-gcc (GCC) 11.2.0

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>

New smatch warnings:
kernel/bpf/verifier.c:619 mark_stack_slot_scratched() warn: should '1 << spi' be a 64 bit type?

vim +619 kernel/bpf/verifier.c

0f55f9ed21f9663 Christy Lee 2021-12-16  617  static void mark_stack_slot_scratched(struct bpf_verifier_env *env, u32 spi)
0f55f9ed21f9663 Christy Lee 2021-12-16  618  {
0f55f9ed21f9663 Christy Lee 2021-12-16 @619  	env->scratched_stack_slots |= 1UL << spi;

Use 1ULL instead.

0f55f9ed21f9663 Christy Lee 2021-12-16  620  }

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

^ permalink raw reply	[flat|nested] 16+ messages in thread

* [PATCH bpf-next] Fix incorrect integer literal used for marking scratched registers in  verifier logs
  2022-01-07  8:20 ` Dan Carpenter
@ 2022-01-08  0:58   ` Christy Lee
  -1 siblings, 0 replies; 16+ messages in thread
From: Christy Lee @ 2022-01-08  0:58 UTC (permalink / raw)
  To: dan.carpenter
  Cc: ast, christylee, kbuild-all, kbuild, linux-mm, bpf, kernel-team,
	christyc.y.lee, kernel test robot

env->scratched_stack_slots is a 64-bit value, we should use ULL
instead of UL literal values.

Reported-by: kernel test robot <lkp@intel.com>
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Christy Lee <christylee@fb.com>
---
 kernel/bpf/verifier.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
index bfb45381fb3f..a8587210907d 100644
--- a/kernel/bpf/verifier.c
+++ b/kernel/bpf/verifier.c
@@ -616,7 +616,7 @@ static void mark_reg_scratched(struct bpf_verifier_env *env, u32 regno)
 
 static void mark_stack_slot_scratched(struct bpf_verifier_env *env, u32 spi)
 {
-	env->scratched_stack_slots |= 1UL << spi;
+	env->scratched_stack_slots |= 1ULL << spi;
 }
 
 static bool reg_scratched(const struct bpf_verifier_env *env, u32 regno)
@@ -637,14 +637,14 @@ static bool verifier_state_scratched(const struct bpf_verifier_env *env)
 static void mark_verifier_state_clean(struct bpf_verifier_env *env)
 {
 	env->scratched_regs = 0U;
-	env->scratched_stack_slots = 0UL;
+	env->scratched_stack_slots = 0ULL;
 }
 
 /* Used for printing the entire verifier state. */
 static void mark_verifier_state_scratched(struct bpf_verifier_env *env)
 {
 	env->scratched_regs = ~0U;
-	env->scratched_stack_slots = ~0UL;
+	env->scratched_stack_slots = ~0ULL;
 }
 
 /* The reg state of a pointer or a bounded scalar was saved when
-- 
2.30.2


^ permalink raw reply related	[flat|nested] 16+ messages in thread

* [PATCH bpf-next] Fix incorrect integer literal used for marking scratched registers in verifier logs
@ 2022-01-08  0:58   ` Christy Lee
  0 siblings, 0 replies; 16+ messages in thread
From: Christy Lee @ 2022-01-08  0:58 UTC (permalink / raw)
  To: kbuild-all

[-- Attachment #1: Type: text/plain, Size: 1458 bytes --]

env->scratched_stack_slots is a 64-bit value, we should use ULL
instead of UL literal values.

Reported-by: kernel test robot <lkp@intel.com>
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Christy Lee <christylee@fb.com>
---
 kernel/bpf/verifier.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
index bfb45381fb3f..a8587210907d 100644
--- a/kernel/bpf/verifier.c
+++ b/kernel/bpf/verifier.c
@@ -616,7 +616,7 @@ static void mark_reg_scratched(struct bpf_verifier_env *env, u32 regno)
 
 static void mark_stack_slot_scratched(struct bpf_verifier_env *env, u32 spi)
 {
-	env->scratched_stack_slots |= 1UL << spi;
+	env->scratched_stack_slots |= 1ULL << spi;
 }
 
 static bool reg_scratched(const struct bpf_verifier_env *env, u32 regno)
@@ -637,14 +637,14 @@ static bool verifier_state_scratched(const struct bpf_verifier_env *env)
 static void mark_verifier_state_clean(struct bpf_verifier_env *env)
 {
 	env->scratched_regs = 0U;
-	env->scratched_stack_slots = 0UL;
+	env->scratched_stack_slots = 0ULL;
 }
 
 /* Used for printing the entire verifier state. */
 static void mark_verifier_state_scratched(struct bpf_verifier_env *env)
 {
 	env->scratched_regs = ~0U;
-	env->scratched_stack_slots = ~0UL;
+	env->scratched_stack_slots = ~0ULL;
 }
 
 /* The reg state of a pointer or a bounded scalar was saved when
-- 
2.30.2

^ permalink raw reply related	[flat|nested] 16+ messages in thread

* Re: [PATCH bpf-next] Fix incorrect integer literal used for marking scratched registers in verifier logs
  2022-01-08  0:58   ` Christy Lee
@ 2022-01-10 21:52     ` Song Liu
  -1 siblings, 0 replies; 16+ messages in thread
From: Song Liu @ 2022-01-10 21:52 UTC (permalink / raw)
  To: Christy Lee
  Cc: Dan Carpenter, Alexei Starovoitov, kbuild-all, kbuild, Linux-MM,
	bpf, Kernel Team, christyc.y.lee, kernel test robot

On Fri, Jan 7, 2022 at 4:59 PM Christy Lee <christylee@fb.com> wrote:
>
> env->scratched_stack_slots is a 64-bit value, we should use ULL
> instead of UL literal values.
>
> Reported-by: kernel test robot <lkp@intel.com>
> Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
> Signed-off-by: Christy Lee <christylee@fb.com>

The fix looks good to me. Thus:

Acked-by: Song Liu <songliubraving@fb.com>

However, the patch looks corrupted. Also, the subject is probably too
long (./scripts/checkpatch.pl should complain about it).

Thanks,
Song


> ---
>  kernel/bpf/verifier.c | 6 +++---
>  1 file changed, 3 insertions(+), 3 deletions(-)
>
> diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
> index bfb45381fb3f..a8587210907d 100644
> --- a/kernel/bpf/verifier.c
> +++ b/kernel/bpf/verifier.c
> @@ -616,7 +616,7 @@ static void mark_reg_scratched(struct bpf_verifier_env *env, u32 regno)
>
>  static void mark_stack_slot_scratched(struct bpf_verifier_env *env, u32 spi)
>  {
> -       env->scratched_stack_slots |= 1UL << spi;
> +       env->scratched_stack_slots |= 1ULL << spi;
>  }
>
>  static bool reg_scratched(const struct bpf_verifier_env *env, u32 regno)
> @@ -637,14 +637,14 @@ static bool verifier_state_scratched(const struct bpf_verifier_env *env)
>  static void mark_verifier_state_clean(struct bpf_verifier_env *env)
>  {
>         env->scratched_regs = 0U;
> -       env->scratched_stack_slots = 0UL;
> +       env->scratched_stack_slots = 0ULL;
>  }
>
>  /* Used for printing the entire verifier state. */
>  static void mark_verifier_state_scratched(struct bpf_verifier_env *env)
>  {
>         env->scratched_regs = ~0U;
> -       env->scratched_stack_slots = ~0UL;
> +       env->scratched_stack_slots = ~0ULL;
>  }
>
>  /* The reg state of a pointer or a bounded scalar was saved when
> --
> 2.30.2
>

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: [PATCH bpf-next] Fix incorrect integer literal used for marking scratched registers in verifier logs
@ 2022-01-10 21:52     ` Song Liu
  0 siblings, 0 replies; 16+ messages in thread
From: Song Liu @ 2022-01-10 21:52 UTC (permalink / raw)
  To: kbuild-all

[-- Attachment #1: Type: text/plain, Size: 1887 bytes --]

On Fri, Jan 7, 2022 at 4:59 PM Christy Lee <christylee@fb.com> wrote:
>
> env->scratched_stack_slots is a 64-bit value, we should use ULL
> instead of UL literal values.
>
> Reported-by: kernel test robot <lkp@intel.com>
> Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
> Signed-off-by: Christy Lee <christylee@fb.com>

The fix looks good to me. Thus:

Acked-by: Song Liu <songliubraving@fb.com>

However, the patch looks corrupted. Also, the subject is probably too
long (./scripts/checkpatch.pl should complain about it).

Thanks,
Song


> ---
>  kernel/bpf/verifier.c | 6 +++---
>  1 file changed, 3 insertions(+), 3 deletions(-)
>
> diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
> index bfb45381fb3f..a8587210907d 100644
> --- a/kernel/bpf/verifier.c
> +++ b/kernel/bpf/verifier.c
> @@ -616,7 +616,7 @@ static void mark_reg_scratched(struct bpf_verifier_env *env, u32 regno)
>
>  static void mark_stack_slot_scratched(struct bpf_verifier_env *env, u32 spi)
>  {
> -       env->scratched_stack_slots |= 1UL << spi;
> +       env->scratched_stack_slots |= 1ULL << spi;
>  }
>
>  static bool reg_scratched(const struct bpf_verifier_env *env, u32 regno)
> @@ -637,14 +637,14 @@ static bool verifier_state_scratched(const struct bpf_verifier_env *env)
>  static void mark_verifier_state_clean(struct bpf_verifier_env *env)
>  {
>         env->scratched_regs = 0U;
> -       env->scratched_stack_slots = 0UL;
> +       env->scratched_stack_slots = 0ULL;
>  }
>
>  /* Used for printing the entire verifier state. */
>  static void mark_verifier_state_scratched(struct bpf_verifier_env *env)
>  {
>         env->scratched_regs = ~0U;
> -       env->scratched_stack_slots = ~0UL;
> +       env->scratched_stack_slots = ~0ULL;
>  }
>
>  /* The reg state of a pointer or a bounded scalar was saved when
> --
> 2.30.2
>

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: [PATCH bpf-next] Fix incorrect integer literal used for marking scratched registers in verifier logs
  2022-01-10 21:52     ` Song Liu
@ 2022-01-10 22:12       ` Christy Lee
  -1 siblings, 0 replies; 16+ messages in thread
From: Christy Lee @ 2022-01-10 22:12 UTC (permalink / raw)
  To: Song Liu
  Cc: Christy Lee, Dan Carpenter, Alexei Starovoitov, kbuild-all,
	kbuild, Linux-MM, bpf, Kernel Team, kernel test robot

On Mon, Jan 10, 2022 at 1:52 PM Song Liu <song@kernel.org> wrote:
>
> On Fri, Jan 7, 2022 at 4:59 PM Christy Lee <christylee@fb.com> wrote:
> >
> > env->scratched_stack_slots is a 64-bit value, we should use ULL
> > instead of UL literal values.
> >
> > Reported-by: kernel test robot <lkp@intel.com>
> > Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
> > Signed-off-by: Christy Lee <christylee@fb.com>
>
> The fix looks good to me. Thus:
>
> Acked-by: Song Liu <songliubraving@fb.com>
>
> However, the patch looks corrupted. Also, the subject is probably too
> long (./scripts/checkpatch.pl should complain about it).
>

I just checked that even with an absurdly long subject (more than 200
characters), ./scripts/checkpatch.pl doesn't complain. It only complains
when the commit message body has longer than 75 characters but not the
subject line.  What's the maximum subject line length?

Christy

> Thanks,
> Song
>
>
> > ---
> >  kernel/bpf/verifier.c | 6 +++---
> >  1 file changed, 3 insertions(+), 3 deletions(-)
> >
> > diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
> > index bfb45381fb3f..a8587210907d 100644
> > --- a/kernel/bpf/verifier.c
> > +++ b/kernel/bpf/verifier.c
> > @@ -616,7 +616,7 @@ static void mark_reg_scratched(struct bpf_verifier_env *env, u32 regno)
> >
> >  static void mark_stack_slot_scratched(struct bpf_verifier_env *env, u32 spi)
> >  {
> > -       env->scratched_stack_slots |= 1UL << spi;
> > +       env->scratched_stack_slots |= 1ULL << spi;
> >  }
> >
> >  static bool reg_scratched(const struct bpf_verifier_env *env, u32 regno)
> > @@ -637,14 +637,14 @@ static bool verifier_state_scratched(const struct bpf_verifier_env *env)
> >  static void mark_verifier_state_clean(struct bpf_verifier_env *env)
> >  {
> >         env->scratched_regs = 0U;
> > -       env->scratched_stack_slots = 0UL;
> > +       env->scratched_stack_slots = 0ULL;
> >  }
> >
> >  /* Used for printing the entire verifier state. */
> >  static void mark_verifier_state_scratched(struct bpf_verifier_env *env)
> >  {
> >         env->scratched_regs = ~0U;
> > -       env->scratched_stack_slots = ~0UL;
> > +       env->scratched_stack_slots = ~0ULL;
> >  }
> >
> >  /* The reg state of a pointer or a bounded scalar was saved when
> > --
> > 2.30.2
> >

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: [PATCH bpf-next] Fix incorrect integer literal used for marking scratched registers in verifier logs
@ 2022-01-10 22:12       ` Christy Lee
  0 siblings, 0 replies; 16+ messages in thread
From: Christy Lee @ 2022-01-10 22:12 UTC (permalink / raw)
  To: kbuild-all

[-- Attachment #1: Type: text/plain, Size: 2353 bytes --]

On Mon, Jan 10, 2022 at 1:52 PM Song Liu <song@kernel.org> wrote:
>
> On Fri, Jan 7, 2022 at 4:59 PM Christy Lee <christylee@fb.com> wrote:
> >
> > env->scratched_stack_slots is a 64-bit value, we should use ULL
> > instead of UL literal values.
> >
> > Reported-by: kernel test robot <lkp@intel.com>
> > Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
> > Signed-off-by: Christy Lee <christylee@fb.com>
>
> The fix looks good to me. Thus:
>
> Acked-by: Song Liu <songliubraving@fb.com>
>
> However, the patch looks corrupted. Also, the subject is probably too
> long (./scripts/checkpatch.pl should complain about it).
>

I just checked that even with an absurdly long subject (more than 200
characters), ./scripts/checkpatch.pl doesn't complain. It only complains
when the commit message body has longer than 75 characters but not the
subject line.  What's the maximum subject line length?

Christy

> Thanks,
> Song
>
>
> > ---
> >  kernel/bpf/verifier.c | 6 +++---
> >  1 file changed, 3 insertions(+), 3 deletions(-)
> >
> > diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
> > index bfb45381fb3f..a8587210907d 100644
> > --- a/kernel/bpf/verifier.c
> > +++ b/kernel/bpf/verifier.c
> > @@ -616,7 +616,7 @@ static void mark_reg_scratched(struct bpf_verifier_env *env, u32 regno)
> >
> >  static void mark_stack_slot_scratched(struct bpf_verifier_env *env, u32 spi)
> >  {
> > -       env->scratched_stack_slots |= 1UL << spi;
> > +       env->scratched_stack_slots |= 1ULL << spi;
> >  }
> >
> >  static bool reg_scratched(const struct bpf_verifier_env *env, u32 regno)
> > @@ -637,14 +637,14 @@ static bool verifier_state_scratched(const struct bpf_verifier_env *env)
> >  static void mark_verifier_state_clean(struct bpf_verifier_env *env)
> >  {
> >         env->scratched_regs = 0U;
> > -       env->scratched_stack_slots = 0UL;
> > +       env->scratched_stack_slots = 0ULL;
> >  }
> >
> >  /* Used for printing the entire verifier state. */
> >  static void mark_verifier_state_scratched(struct bpf_verifier_env *env)
> >  {
> >         env->scratched_regs = ~0U;
> > -       env->scratched_stack_slots = ~0UL;
> > +       env->scratched_stack_slots = ~0ULL;
> >  }
> >
> >  /* The reg state of a pointer or a bounded scalar was saved when
> > --
> > 2.30.2
> >

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: [PATCH bpf-next] Fix incorrect integer literal used for marking scratched registers in verifier logs
  2022-01-10 22:12       ` Christy Lee
@ 2022-01-10 22:25         ` Song Liu
  -1 siblings, 0 replies; 16+ messages in thread
From: Song Liu @ 2022-01-10 22:25 UTC (permalink / raw)
  To: Christy Lee
  Cc: Christy Lee, Dan Carpenter, Alexei Starovoitov, kbuild-all,
	kbuild, Linux-MM, bpf, Kernel Team, kernel test robot

On Mon, Jan 10, 2022 at 2:13 PM Christy Lee <christyc.y.lee@gmail.com> wrote:
>
> On Mon, Jan 10, 2022 at 1:52 PM Song Liu <song@kernel.org> wrote:
> >
> > On Fri, Jan 7, 2022 at 4:59 PM Christy Lee <christylee@fb.com> wrote:
> > >
> > > env->scratched_stack_slots is a 64-bit value, we should use ULL
> > > instead of UL literal values.
> > >
> > > Reported-by: kernel test robot <lkp@intel.com>
> > > Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
> > > Signed-off-by: Christy Lee <christylee@fb.com>
> >
> > The fix looks good to me. Thus:
> >
> > Acked-by: Song Liu <songliubraving@fb.com>
> >
> > However, the patch looks corrupted. Also, the subject is probably too
> > long (./scripts/checkpatch.pl should complain about it).
> >
>
> I just checked that even with an absurdly long subject (more than 200
> characters), ./scripts/checkpatch.pl doesn't complain. It only complains
> when the commit message body has longer than 75 characters but not the
> subject line.  What's the maximum subject line length?

Hmm..  you are right. I somehow thought there was a limit by checkpatch.
I would personally limit it to 75 characters though.

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: [PATCH bpf-next] Fix incorrect integer literal used for marking scratched registers in verifier logs
@ 2022-01-10 22:25         ` Song Liu
  0 siblings, 0 replies; 16+ messages in thread
From: Song Liu @ 2022-01-10 22:25 UTC (permalink / raw)
  To: kbuild-all

[-- Attachment #1: Type: text/plain, Size: 1176 bytes --]

On Mon, Jan 10, 2022 at 2:13 PM Christy Lee <christyc.y.lee@gmail.com> wrote:
>
> On Mon, Jan 10, 2022 at 1:52 PM Song Liu <song@kernel.org> wrote:
> >
> > On Fri, Jan 7, 2022 at 4:59 PM Christy Lee <christylee@fb.com> wrote:
> > >
> > > env->scratched_stack_slots is a 64-bit value, we should use ULL
> > > instead of UL literal values.
> > >
> > > Reported-by: kernel test robot <lkp@intel.com>
> > > Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
> > > Signed-off-by: Christy Lee <christylee@fb.com>
> >
> > The fix looks good to me. Thus:
> >
> > Acked-by: Song Liu <songliubraving@fb.com>
> >
> > However, the patch looks corrupted. Also, the subject is probably too
> > long (./scripts/checkpatch.pl should complain about it).
> >
>
> I just checked that even with an absurdly long subject (more than 200
> characters), ./scripts/checkpatch.pl doesn't complain. It only complains
> when the commit message body has longer than 75 characters but not the
> subject line.  What's the maximum subject line length?

Hmm..  you are right. I somehow thought there was a limit by checkpatch.
I would personally limit it to 75 characters though.

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: [PATCH bpf-next] Fix incorrect integer literal used for marking scratched registers in verifier logs
  2022-01-10 22:12       ` Christy Lee
  (?)
@ 2022-01-11  9:48         ` Dan Carpenter
  -1 siblings, 0 replies; 16+ messages in thread
From: Dan Carpenter @ 2022-01-11  9:48 UTC (permalink / raw)
  To: Christy Lee
  Cc: Song Liu, Christy Lee, Alexei Starovoitov, kbuild-all, kbuild,
	Linux-MM, bpf, Kernel Team, kernel test robot

On Mon, Jan 10, 2022 at 02:12:58PM -0800, Christy Lee wrote:
> On Mon, Jan 10, 2022 at 1:52 PM Song Liu <song@kernel.org> wrote:
> >
> > On Fri, Jan 7, 2022 at 4:59 PM Christy Lee <christylee@fb.com> wrote:
> > >
> > > env->scratched_stack_slots is a 64-bit value, we should use ULL
> > > instead of UL literal values.
> > >
> > > Reported-by: kernel test robot <lkp@intel.com>
> > > Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
> > > Signed-off-by: Christy Lee <christylee@fb.com>
> >
> > The fix looks good to me. Thus:
> >
> > Acked-by: Song Liu <songliubraving@fb.com>
> >
> > However, the patch looks corrupted. Also, the subject is probably too
> > long (./scripts/checkpatch.pl should complain about it).
> >
> 
> I just checked that even with an absurdly long subject (more than 200
> characters), ./scripts/checkpatch.pl doesn't complain. It only complains
> when the commit message body has longer than 75 characters but not the
> subject line.  What's the maximum subject line length?
> 

People say 50 characters but that just seems more aspirational than
realistic.  This patch needs a subsystem prefix as well.

regards,
dan carpenter


^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: [PATCH bpf-next] Fix incorrect integer literal used for marking scratched registers in verifier logs
@ 2022-01-11  9:48         ` Dan Carpenter
  0 siblings, 0 replies; 16+ messages in thread
From: Dan Carpenter @ 2022-01-11  9:48 UTC (permalink / raw)
  To: kbuild

[-- Attachment #1: Type: text/plain, Size: 1189 bytes --]

On Mon, Jan 10, 2022 at 02:12:58PM -0800, Christy Lee wrote:
> On Mon, Jan 10, 2022 at 1:52 PM Song Liu <song@kernel.org> wrote:
> >
> > On Fri, Jan 7, 2022 at 4:59 PM Christy Lee <christylee@fb.com> wrote:
> > >
> > > env->scratched_stack_slots is a 64-bit value, we should use ULL
> > > instead of UL literal values.
> > >
> > > Reported-by: kernel test robot <lkp@intel.com>
> > > Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
> > > Signed-off-by: Christy Lee <christylee@fb.com>
> >
> > The fix looks good to me. Thus:
> >
> > Acked-by: Song Liu <songliubraving@fb.com>
> >
> > However, the patch looks corrupted. Also, the subject is probably too
> > long (./scripts/checkpatch.pl should complain about it).
> >
> 
> I just checked that even with an absurdly long subject (more than 200
> characters), ./scripts/checkpatch.pl doesn't complain. It only complains
> when the commit message body has longer than 75 characters but not the
> subject line.  What's the maximum subject line length?
> 

People say 50 characters but that just seems more aspirational than
realistic.  This patch needs a subsystem prefix as well.

regards,
dan carpenter

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: [PATCH bpf-next] Fix incorrect integer literal used for marking scratched registers in verifier logs
@ 2022-01-11  9:48         ` Dan Carpenter
  0 siblings, 0 replies; 16+ messages in thread
From: Dan Carpenter @ 2022-01-11  9:48 UTC (permalink / raw)
  To: kbuild-all

[-- Attachment #1: Type: text/plain, Size: 1189 bytes --]

On Mon, Jan 10, 2022 at 02:12:58PM -0800, Christy Lee wrote:
> On Mon, Jan 10, 2022 at 1:52 PM Song Liu <song@kernel.org> wrote:
> >
> > On Fri, Jan 7, 2022 at 4:59 PM Christy Lee <christylee@fb.com> wrote:
> > >
> > > env->scratched_stack_slots is a 64-bit value, we should use ULL
> > > instead of UL literal values.
> > >
> > > Reported-by: kernel test robot <lkp@intel.com>
> > > Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
> > > Signed-off-by: Christy Lee <christylee@fb.com>
> >
> > The fix looks good to me. Thus:
> >
> > Acked-by: Song Liu <songliubraving@fb.com>
> >
> > However, the patch looks corrupted. Also, the subject is probably too
> > long (./scripts/checkpatch.pl should complain about it).
> >
> 
> I just checked that even with an absurdly long subject (more than 200
> characters), ./scripts/checkpatch.pl doesn't complain. It only complains
> when the commit message body has longer than 75 characters but not the
> subject line.  What's the maximum subject line length?
> 

People say 50 characters but that just seems more aspirational than
realistic.  This patch needs a subsystem prefix as well.

regards,
dan carpenter

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: [PATCH bpf-next] Fix incorrect integer literal used for marking scratched registers in verifier logs
  2022-01-11  9:48         ` Dan Carpenter
@ 2022-01-11 17:56           ` Alexei Starovoitov
  -1 siblings, 0 replies; 16+ messages in thread
From: Alexei Starovoitov @ 2022-01-11 17:56 UTC (permalink / raw)
  To: Dan Carpenter
  Cc: Christy Lee, Song Liu, Christy Lee, Alexei Starovoitov,
	kbuild-all, kbuild, Linux-MM, bpf, Kernel Team,
	kernel test robot

On Tue, Jan 11, 2022 at 1:49 AM Dan Carpenter <dan.carpenter@oracle.com> wrote:
>
> On Mon, Jan 10, 2022 at 02:12:58PM -0800, Christy Lee wrote:
> > On Mon, Jan 10, 2022 at 1:52 PM Song Liu <song@kernel.org> wrote:
> > >
> > > On Fri, Jan 7, 2022 at 4:59 PM Christy Lee <christylee@fb.com> wrote:
> > > >
> > > > env->scratched_stack_slots is a 64-bit value, we should use ULL
> > > > instead of UL literal values.
> > > >
> > > > Reported-by: kernel test robot <lkp@intel.com>
> > > > Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
> > > > Signed-off-by: Christy Lee <christylee@fb.com>
> > >
> > > The fix looks good to me. Thus:
> > >
> > > Acked-by: Song Liu <songliubraving@fb.com>
> > >
> > > However, the patch looks corrupted. Also, the subject is probably too
> > > long (./scripts/checkpatch.pl should complain about it).
> > >
> >
> > I just checked that even with an absurdly long subject (more than 200
> > characters), ./scripts/checkpatch.pl doesn't complain. It only complains
> > when the commit message body has longer than 75 characters but not the
> > subject line.  What's the maximum subject line length?
> >
>
> People say 50 characters but that just seems more aspirational than
> realistic.  This patch needs a subsystem prefix as well.

I fixed patch subj and applied to bpf tree.
Thanks everyone.

^ permalink raw reply	[flat|nested] 16+ messages in thread

* Re: [PATCH bpf-next] Fix incorrect integer literal used for marking scratched registers in verifier logs
@ 2022-01-11 17:56           ` Alexei Starovoitov
  0 siblings, 0 replies; 16+ messages in thread
From: Alexei Starovoitov @ 2022-01-11 17:56 UTC (permalink / raw)
  To: kbuild-all

[-- Attachment #1: Type: text/plain, Size: 1362 bytes --]

On Tue, Jan 11, 2022 at 1:49 AM Dan Carpenter <dan.carpenter@oracle.com> wrote:
>
> On Mon, Jan 10, 2022 at 02:12:58PM -0800, Christy Lee wrote:
> > On Mon, Jan 10, 2022 at 1:52 PM Song Liu <song@kernel.org> wrote:
> > >
> > > On Fri, Jan 7, 2022 at 4:59 PM Christy Lee <christylee@fb.com> wrote:
> > > >
> > > > env->scratched_stack_slots is a 64-bit value, we should use ULL
> > > > instead of UL literal values.
> > > >
> > > > Reported-by: kernel test robot <lkp@intel.com>
> > > > Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
> > > > Signed-off-by: Christy Lee <christylee@fb.com>
> > >
> > > The fix looks good to me. Thus:
> > >
> > > Acked-by: Song Liu <songliubraving@fb.com>
> > >
> > > However, the patch looks corrupted. Also, the subject is probably too
> > > long (./scripts/checkpatch.pl should complain about it).
> > >
> >
> > I just checked that even with an absurdly long subject (more than 200
> > characters), ./scripts/checkpatch.pl doesn't complain. It only complains
> > when the commit message body has longer than 75 characters but not the
> > subject line.  What's the maximum subject line length?
> >
>
> People say 50 characters but that just seems more aspirational than
> realistic.  This patch needs a subsystem prefix as well.

I fixed patch subj and applied to bpf tree.
Thanks everyone.

^ permalink raw reply	[flat|nested] 16+ messages in thread

end of thread, other threads:[~2022-01-11 17:56 UTC | newest]

Thread overview: 16+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-01-06  0:09 [linux-next:master 7391/10864] kernel/bpf/verifier.c:619 mark_stack_slot_scratched() warn: should '1 << spi' be a 64 bit type? kernel test robot
2022-01-07  8:20 ` Dan Carpenter
2022-01-07  8:20 ` Dan Carpenter
2022-01-08  0:58 ` [PATCH bpf-next] Fix incorrect integer literal used for marking scratched registers in verifier logs Christy Lee
2022-01-08  0:58   ` Christy Lee
2022-01-10 21:52   ` Song Liu
2022-01-10 21:52     ` Song Liu
2022-01-10 22:12     ` Christy Lee
2022-01-10 22:12       ` Christy Lee
2022-01-10 22:25       ` Song Liu
2022-01-10 22:25         ` Song Liu
2022-01-11  9:48       ` Dan Carpenter
2022-01-11  9:48         ` Dan Carpenter
2022-01-11  9:48         ` Dan Carpenter
2022-01-11 17:56         ` Alexei Starovoitov
2022-01-11 17:56           ` Alexei Starovoitov

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.