Build check errors found: 2019-03-31
by postmaster@open-mesh.org
Name of failed tests
====================
master
------
* difference between net-next and batadv master
Output of different failed tests
================================
master: difference between net-next and batadv master
-----------------------------------------------------
netnext/net/batman-adv/bat_v_elp.c | 6 +--
netnext/net/batman-adv/bridge_loop_avoidance.c | 16 +-------
netnext/net/batman-adv/main.h | 2 -
netnext/net/batman-adv/netlink.c | 19 ---------
netnext/net/batman-adv/sysfs.c | 7 +--
netnext/net/batman-adv/translation-table.c | 32 ++++------------
6 files changed, 17 insertions(+), 65 deletions(-)
Statistics
==========
maint
-----
Failed tests: 0
Started build tests: 53
Tested Linux versions: 27
Tested configs: 51
master
------
Failed tests: 1
Started build tests: 52
Tested Linux versions: 26
Tested configs: 50
3 years, 10 months
Build check errors found: 2019-03-30
by postmaster@open-mesh.org
Name of failed tests
====================
master
------
* difference between net-next and batadv master
Output of different failed tests
================================
master: difference between net-next and batadv master
-----------------------------------------------------
netnext/net/batman-adv/bat_v_elp.c | 6 +--
netnext/net/batman-adv/bridge_loop_avoidance.c | 16 +-------
netnext/net/batman-adv/main.h | 2 -
netnext/net/batman-adv/netlink.c | 19 ---------
netnext/net/batman-adv/sysfs.c | 7 +--
netnext/net/batman-adv/translation-table.c | 32 ++++------------
6 files changed, 17 insertions(+), 65 deletions(-)
Statistics
==========
master
------
Failed tests: 1
Started build tests: 51
Tested Linux versions: 24
Tested configs: 50
maint
-----
Failed tests: 0
Started build tests: 53
Tested Linux versions: 26
Tested configs: 49
3 years, 10 months
[linux-next] LinuxNextTracking branch, master, updated. next-20190329
by batman@open-mesh.org
The following commit has been merged in the master branch:
commit a7efefc7b49c24525331c7716f8b6de9bd023401
Merge: 3572172a081601ea325e57f7381917d62fe9859e 356d71e00d278d865f8c7f68adebd6ce4698a7e2
Author: Stephen Rothwell <sfr(a)canb.auug.org.au>
Date: Fri Mar 29 09:24:09 2019 +1100
Merge remote-tracking branch 'net-next/master'
diff --combined kernel/bpf/verifier.c
index 6c5a41f7f338,2fe89138309a..b7ad8003c4e6
--- a/kernel/bpf/verifier.c
+++ b/kernel/bpf/verifier.c
@@@ -377,7 -377,8 +377,8 @@@ static bool is_release_function(enum bp
static bool is_acquire_function(enum bpf_func_id func_id)
{
return func_id == BPF_FUNC_sk_lookup_tcp ||
- func_id == BPF_FUNC_sk_lookup_udp;
+ func_id == BPF_FUNC_sk_lookup_udp ||
+ func_id == BPF_FUNC_skc_lookup_tcp;
}
static bool is_ptr_cast_function(enum bpf_func_id func_id)
@@@ -1897,9 -1898,8 +1898,9 @@@ continue_func
}
frame++;
if (frame >= MAX_CALL_FRAMES) {
- WARN_ONCE(1, "verifier bug. Call stack is too deep\n");
- return -EFAULT;
+ verbose(env, "the call stack of %d frames is too deep !\n",
+ frame);
+ return -E2BIG;
}
goto process_func;
}
@@@ -3157,19 -3157,11 +3158,11 @@@ static int check_helper_call(struct bpf
} else if (fn->ret_type == RET_PTR_TO_SOCKET_OR_NULL) {
mark_reg_known_zero(env, regs, BPF_REG_0);
regs[BPF_REG_0].type = PTR_TO_SOCKET_OR_NULL;
- if (is_acquire_function(func_id)) {
- int id = acquire_reference_state(env, insn_idx);
-
- if (id < 0)
- return id;
- /* For mark_ptr_or_null_reg() */
- regs[BPF_REG_0].id = id;
- /* For release_reference() */
- regs[BPF_REG_0].ref_obj_id = id;
- } else {
- /* For mark_ptr_or_null_reg() */
- regs[BPF_REG_0].id = ++env->id_gen;
- }
+ regs[BPF_REG_0].id = ++env->id_gen;
+ } else if (fn->ret_type == RET_PTR_TO_SOCK_COMMON_OR_NULL) {
+ mark_reg_known_zero(env, regs, BPF_REG_0);
+ regs[BPF_REG_0].type = PTR_TO_SOCK_COMMON_OR_NULL;
+ regs[BPF_REG_0].id = ++env->id_gen;
} else if (fn->ret_type == RET_PTR_TO_TCP_SOCK_OR_NULL) {
mark_reg_known_zero(env, regs, BPF_REG_0);
regs[BPF_REG_0].type = PTR_TO_TCP_SOCK_OR_NULL;
@@@ -3180,9 -3172,19 +3173,19 @@@
return -EINVAL;
}
- if (is_ptr_cast_function(func_id))
+ if (is_ptr_cast_function(func_id)) {
/* For release_reference() */
regs[BPF_REG_0].ref_obj_id = meta.ref_obj_id;
+ } else if (is_acquire_function(func_id)) {
+ int id = acquire_reference_state(env, insn_idx);
+
+ if (id < 0)
+ return id;
+ /* For mark_ptr_or_null_reg() */
+ regs[BPF_REG_0].id = id;
+ /* For release_reference() */
+ regs[BPF_REG_0].ref_obj_id = id;
+ }
do_refine_retval_range(regs, fn->ret_type, func_id, &meta);
diff --combined net/core/datagram.c
index e657289db4ac,0dafec5cada0..91bb5a083fee
--- a/net/core/datagram.c
+++ b/net/core/datagram.c
@@@ -61,6 -61,8 +61,8 @@@
#include <trace/events/skb.h>
#include <net/busy_poll.h>
+ #include "datagram.h"
+
/*
* Is a socket 'connection oriented' ?
*/
@@@ -279,7 -281,7 +281,7 @@@ struct sk_buff *__skb_try_recv_datagram
break;
sk_busy_loop(sk, flags & MSG_DONTWAIT);
- } while (!skb_queue_empty(&sk->sk_receive_queue));
+ } while (sk->sk_receive_queue.prev != *last);
error = -EAGAIN;
@@@ -408,10 -410,10 +410,10 @@@ int skb_kill_datagram(struct sock *sk,
}
EXPORT_SYMBOL(skb_kill_datagram);
- int __skb_datagram_iter(const struct sk_buff *skb, int offset,
- struct iov_iter *to, int len, bool fault_short,
- size_t (*cb)(const void *, size_t, void *, struct iov_iter *),
- void *data)
+ static int __skb_datagram_iter(const struct sk_buff *skb, int offset,
+ struct iov_iter *to, int len, bool fault_short,
+ size_t (*cb)(const void *, size_t, void *,
+ struct iov_iter *), void *data)
{
int start = skb_headlen(skb);
int i, copy = start - offset, start_off = offset, n;
--
LinuxNextTracking
3 years, 10 months
[linux-next] LinuxNextTracking branch, master, updated. next-20190329
by batman@open-mesh.org
The following commit has been merged in the master branch:
commit f131a56880d10932931e74773fb8702894a94a75
Author: Sven Eckelmann <sven(a)narfation.org>
Date: Sat Feb 23 14:27:10 2019 +0100
batman-adv: Reduce tt_global hash refcnt only for removed entry
The batadv_hash_remove is a function which searches the hashtable for an
entry using a needle, a hashtable bucket selection function and a compare
function. It will lock the bucket list and delete an entry when the compare
function matches it with the needle. It returns the pointer to the
hlist_node which matches or NULL when no entry matches the needle.
The batadv_tt_global_free is not itself protected in anyway to avoid that
any other function is modifying the hashtable between the search for the
entry and the call to batadv_hash_remove. It can therefore happen that the
entry either doesn't exist anymore or an entry was deleted which is not the
same object as the needle. In such an situation, the reference counter (for
the reference stored in the hashtable) must not be reduced for the needle.
Instead the reference counter of the actually removed entry has to be
reduced.
Otherwise the reference counter will underflow and the object might be
freed before all its references were dropped. The kref helpers reported
this problem as:
refcount_t: underflow; use-after-free.
Fixes: 7683fdc1e886 ("batman-adv: protect the local and the global trans-tables with rcu")
Reported-by: Martin Weinelt <martin(a)linuxlounge.net>
Signed-off-by: Sven Eckelmann <sven(a)narfation.org>
Acked-by: Antonio Quartulli <a(a)unstable.cc>
Signed-off-by: Simon Wunderlich <sw(a)simonwunderlich.de>
diff --git a/net/batman-adv/translation-table.c b/net/batman-adv/translation-table.c
index b5cfc5068a90..26c4e2493ddf 100644
--- a/net/batman-adv/translation-table.c
+++ b/net/batman-adv/translation-table.c
@@ -616,14 +616,26 @@ static void batadv_tt_global_free(struct batadv_priv *bat_priv,
struct batadv_tt_global_entry *tt_global,
const char *message)
{
+ struct batadv_tt_global_entry *tt_removed_entry;
+ struct hlist_node *tt_removed_node;
+
batadv_dbg(BATADV_DBG_TT, bat_priv,
"Deleting global tt entry %pM (vid: %d): %s\n",
tt_global->common.addr,
batadv_print_vid(tt_global->common.vid), message);
- batadv_hash_remove(bat_priv->tt.global_hash, batadv_compare_tt,
- batadv_choose_tt, &tt_global->common);
- batadv_tt_global_entry_put(tt_global);
+ tt_removed_node = batadv_hash_remove(bat_priv->tt.global_hash,
+ batadv_compare_tt,
+ batadv_choose_tt,
+ &tt_global->common);
+ if (!tt_removed_node)
+ return;
+
+ /* drop reference of remove hash entry */
+ tt_removed_entry = hlist_entry(tt_removed_node,
+ struct batadv_tt_global_entry,
+ common.hash_entry);
+ batadv_tt_global_entry_put(tt_removed_entry);
}
/**
--
LinuxNextTracking
3 years, 10 months
[linux-next] LinuxNextTracking branch, master, updated. next-20190329
by batman@open-mesh.org
The following commit has been merged in the master branch:
commit ca8c3b922e7032aff6cc3fd05548f4df1f3df90e
Author: Anders Roxell <anders.roxell(a)linaro.org>
Date: Fri Feb 22 16:25:54 2019 +0100
batman-adv: fix warning in function batadv_v_elp_get_throughput
When CONFIG_CFG80211 isn't enabled the compiler correcly warns about
'sinfo.pertid' may be unused. It can also happen for other error
conditions that it not warn about.
net/batman-adv/bat_v_elp.c: In function ‘batadv_v_elp_get_throughput.isra.0’:
include/net/cfg80211.h:6370:13: warning: ‘sinfo.pertid’ may be used
uninitialized in this function [-Wmaybe-uninitialized]
kfree(sinfo->pertid);
~~~~~^~~~~~~~
Rework so that we only release '&sinfo' if cfg80211_get_station returns
zero.
Fixes: 7d652669b61d ("batman-adv: release station info tidstats")
Signed-off-by: Anders Roxell <anders.roxell(a)linaro.org>
Signed-off-by: Sven Eckelmann <sven(a)narfation.org>
Signed-off-by: Simon Wunderlich <sw(a)simonwunderlich.de>
diff --git a/net/batman-adv/bat_v_elp.c b/net/batman-adv/bat_v_elp.c
index a9b7919c9de5..d5df0114f08a 100644
--- a/net/batman-adv/bat_v_elp.c
+++ b/net/batman-adv/bat_v_elp.c
@@ -104,8 +104,10 @@ static u32 batadv_v_elp_get_throughput(struct batadv_hardif_neigh_node *neigh)
ret = cfg80211_get_station(real_netdev, neigh->addr, &sinfo);
- /* free the TID stats immediately */
- cfg80211_sinfo_release_content(&sinfo);
+ if (!ret) {
+ /* free the TID stats immediately */
+ cfg80211_sinfo_release_content(&sinfo);
+ }
dev_put(real_netdev);
if (ret == -ENOENT) {
--
LinuxNextTracking
3 years, 10 months
[linux-next] LinuxNextTracking branch, master, updated. next-20190329
by batman@open-mesh.org
The following commit has been merged in the master branch:
commit 438b3d3fae4346a49fe12fa7cc1dc9327f006a91
Author: Sven Eckelmann <sven(a)narfation.org>
Date: Sun Mar 3 19:25:26 2019 +0100
batman-adv: Fix genl notification for throughput_override
The throughput_override sysfs file is not below the meshif but below a
hardif. The kobj has therefore not a pointer which can be used to find the
batadv_priv data. The pointer stored in the hardif object must be used
instead to find the correct meshif private data.
Fixes: 7e6f461efe25 ("batman-adv: Trigger genl notification on sysfs config change")
Signed-off-by: Sven Eckelmann <sven(a)narfation.org>
Signed-off-by: Simon Wunderlich <sw(a)simonwunderlich.de>
diff --git a/net/batman-adv/sysfs.c b/net/batman-adv/sysfs.c
index 0b4b3fb778a6..208655cf6717 100644
--- a/net/batman-adv/sysfs.c
+++ b/net/batman-adv/sysfs.c
@@ -1116,9 +1116,9 @@ static ssize_t batadv_store_throughput_override(struct kobject *kobj,
struct attribute *attr,
char *buff, size_t count)
{
- struct batadv_priv *bat_priv = batadv_kobj_to_batpriv(kobj);
struct net_device *net_dev = batadv_kobj_to_netdev(kobj);
struct batadv_hard_iface *hard_iface;
+ struct batadv_priv *bat_priv;
u32 tp_override;
u32 old_tp_override;
bool ret;
@@ -1147,7 +1147,10 @@ static ssize_t batadv_store_throughput_override(struct kobject *kobj,
atomic_set(&hard_iface->bat_v.throughput_override, tp_override);
- batadv_netlink_notify_hardif(bat_priv, hard_iface);
+ if (hard_iface->soft_iface) {
+ bat_priv = netdev_priv(hard_iface->soft_iface);
+ batadv_netlink_notify_hardif(bat_priv, hard_iface);
+ }
out:
batadv_hardif_put(hard_iface);
--
LinuxNextTracking
3 years, 10 months
[linux-next] LinuxNextTracking branch, master, updated. next-20190329
by batman@open-mesh.org
The following commit has been merged in the master branch:
commit 3d65b9accab4a7ed5038f6df403fbd5e298398c7
Author: Sven Eckelmann <sven(a)narfation.org>
Date: Sat Feb 23 14:27:10 2019 +0100
batman-adv: Reduce tt_local hash refcnt only for removed entry
The batadv_hash_remove is a function which searches the hashtable for an
entry using a needle, a hashtable bucket selection function and a compare
function. It will lock the bucket list and delete an entry when the compare
function matches it with the needle. It returns the pointer to the
hlist_node which matches or NULL when no entry matches the needle.
The batadv_tt_local_remove is not itself protected in anyway to avoid that
any other function is modifying the hashtable between the search for the
entry and the call to batadv_hash_remove. It can therefore happen that the
entry either doesn't exist anymore or an entry was deleted which is not the
same object as the needle. In such an situation, the reference counter (for
the reference stored in the hashtable) must not be reduced for the needle.
Instead the reference counter of the actually removed entry has to be
reduced.
Otherwise the reference counter will underflow and the object might be
freed before all its references were dropped. The kref helpers reported
this problem as:
refcount_t: underflow; use-after-free.
Fixes: ef72706a0543 ("batman-adv: protect tt_local_entry from concurrent delete events")
Signed-off-by: Sven Eckelmann <sven(a)narfation.org>
Signed-off-by: Simon Wunderlich <sw(a)simonwunderlich.de>
diff --git a/net/batman-adv/translation-table.c b/net/batman-adv/translation-table.c
index f73d79139ae7..b5cfc5068a90 100644
--- a/net/batman-adv/translation-table.c
+++ b/net/batman-adv/translation-table.c
@@ -1337,9 +1337,10 @@ u16 batadv_tt_local_remove(struct batadv_priv *bat_priv, const u8 *addr,
unsigned short vid, const char *message,
bool roaming)
{
+ struct batadv_tt_local_entry *tt_removed_entry;
struct batadv_tt_local_entry *tt_local_entry;
u16 flags, curr_flags = BATADV_NO_FLAGS;
- void *tt_entry_exists;
+ struct hlist_node *tt_removed_node;
tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
if (!tt_local_entry)
@@ -1368,15 +1369,18 @@ u16 batadv_tt_local_remove(struct batadv_priv *bat_priv, const u8 *addr,
*/
batadv_tt_local_event(bat_priv, tt_local_entry, BATADV_TT_CLIENT_DEL);
- tt_entry_exists = batadv_hash_remove(bat_priv->tt.local_hash,
+ tt_removed_node = batadv_hash_remove(bat_priv->tt.local_hash,
batadv_compare_tt,
batadv_choose_tt,
&tt_local_entry->common);
- if (!tt_entry_exists)
+ if (!tt_removed_node)
goto out;
- /* extra call to free the local tt entry */
- batadv_tt_local_entry_put(tt_local_entry);
+ /* drop reference of remove hash entry */
+ tt_removed_entry = hlist_entry(tt_removed_node,
+ struct batadv_tt_local_entry,
+ common.hash_entry);
+ batadv_tt_local_entry_put(tt_removed_entry);
out:
if (tt_local_entry)
--
LinuxNextTracking
3 years, 10 months
[linux-next] LinuxNextTracking branch, master, updated. next-20190329
by batman@open-mesh.org
The following commit has been merged in the master branch:
commit 4ba104f468bbfc27362c393815d03aa18fb7a20f
Author: Sven Eckelmann <sven(a)narfation.org>
Date: Sat Feb 23 14:27:10 2019 +0100
batman-adv: Reduce claim hash refcnt only for removed entry
The batadv_hash_remove is a function which searches the hashtable for an
entry using a needle, a hashtable bucket selection function and a compare
function. It will lock the bucket list and delete an entry when the compare
function matches it with the needle. It returns the pointer to the
hlist_node which matches or NULL when no entry matches the needle.
The batadv_bla_del_claim is not itself protected in anyway to avoid that
any other function is modifying the hashtable between the search for the
entry and the call to batadv_hash_remove. It can therefore happen that the
entry either doesn't exist anymore or an entry was deleted which is not the
same object as the needle. In such an situation, the reference counter (for
the reference stored in the hashtable) must not be reduced for the needle.
Instead the reference counter of the actually removed entry has to be
reduced.
Otherwise the reference counter will underflow and the object might be
freed before all its references were dropped. The kref helpers reported
this problem as:
refcount_t: underflow; use-after-free.
Fixes: 23721387c409 ("batman-adv: add basic bridge loop avoidance code")
Signed-off-by: Sven Eckelmann <sven(a)narfation.org>
Signed-off-by: Simon Wunderlich <sw(a)simonwunderlich.de>
diff --git a/net/batman-adv/bridge_loop_avoidance.c b/net/batman-adv/bridge_loop_avoidance.c
index ef39aabdb694..4fb01108e5f5 100644
--- a/net/batman-adv/bridge_loop_avoidance.c
+++ b/net/batman-adv/bridge_loop_avoidance.c
@@ -803,6 +803,8 @@ static void batadv_bla_del_claim(struct batadv_priv *bat_priv,
const u8 *mac, const unsigned short vid)
{
struct batadv_bla_claim search_claim, *claim;
+ struct batadv_bla_claim *claim_removed_entry;
+ struct hlist_node *claim_removed_node;
ether_addr_copy(search_claim.addr, mac);
search_claim.vid = vid;
@@ -813,10 +815,18 @@ static void batadv_bla_del_claim(struct batadv_priv *bat_priv,
batadv_dbg(BATADV_DBG_BLA, bat_priv, "%s(): %pM, vid %d\n", __func__,
mac, batadv_print_vid(vid));
- batadv_hash_remove(bat_priv->bla.claim_hash, batadv_compare_claim,
- batadv_choose_claim, claim);
- batadv_claim_put(claim); /* reference from the hash is gone */
+ claim_removed_node = batadv_hash_remove(bat_priv->bla.claim_hash,
+ batadv_compare_claim,
+ batadv_choose_claim, claim);
+ if (!claim_removed_node)
+ goto free_claim;
+ /* reference from the hash is gone */
+ claim_removed_entry = hlist_entry(claim_removed_node,
+ struct batadv_bla_claim, hash_entry);
+ batadv_claim_put(claim_removed_entry);
+
+free_claim:
/* don't need the reference from hash_find() anymore */
batadv_claim_put(claim);
}
--
LinuxNextTracking
3 years, 10 months
Build check errors found: 2019-03-29
by postmaster@open-mesh.org
Name of failed tests
====================
master
------
* difference between net-next and batadv master
* unused_symbols linux-3.16 cfg: BLA=y DAT=y DEBUGFS=n DEBUG=y TRACING=n NC=y MCAST=n BATMAN_V=y SYSFS=n
* unused_symbols linux-3.19 cfg: BLA=n DAT=y DEBUGFS=n DEBUG=n TRACING=y NC=y MCAST=n BATMAN_V=y SYSFS=n
* unused_symbols linux-3.19 cfg: BLA=y DAT=y DEBUGFS=n DEBUG=n TRACING=y NC=n MCAST=n BATMAN_V=y SYSFS=n
* unused_symbols linux-4.10 cfg: BLA=y DAT=y DEBUGFS=y DEBUG=y TRACING=n NC=y MCAST=y BATMAN_V=n SYSFS=n
* unused_symbols linux-4.11 cfg: BLA=n DAT=n DEBUGFS=y DEBUG=n TRACING=y NC=n MCAST=y BATMAN_V=n SYSFS=n
* unused_symbols linux-4.11 cfg: BLA=n DAT=n DEBUGFS=y DEBUG=n TRACING=y NC=y MCAST=n BATMAN_V=n SYSFS=n
* unused_symbols linux-4.12 cfg: BLA=n DAT=n DEBUGFS=n DEBUG=n TRACING=n NC=n MCAST=n BATMAN_V=y SYSFS=n
* unused_symbols linux-4.12 cfg: BLA=n DAT=y DEBUGFS=n DEBUG=y TRACING=y NC=n MCAST=y BATMAN_V=n SYSFS=n
* unused_symbols linux-4.12 cfg: BLA=n DAT=y DEBUGFS=y DEBUG=n TRACING=n NC=n MCAST=y BATMAN_V=n SYSFS=n
* unused_symbols linux-4.13 cfg: BLA=y DAT=n DEBUGFS=n DEBUG=n TRACING=y NC=n MCAST=y BATMAN_V=y SYSFS=n
* unused_symbols linux-4.14.104 cfg: BLA=n DAT=n DEBUGFS=n DEBUG=y TRACING=y NC=y MCAST=y BATMAN_V=y SYSFS=n
* unused_symbols linux-4.15 cfg: BLA=y DAT=n DEBUGFS=n DEBUG=y TRACING=n NC=y MCAST=y BATMAN_V=n SYSFS=n
* unused_symbols linux-4.15 cfg: BLA=y DAT=n DEBUGFS=y DEBUG=y TRACING=n NC=n MCAST=n BATMAN_V=y SYSFS=n
* unused_symbols linux-4.19 cfg: BLA=n DAT=y DEBUGFS=n DEBUG=n TRACING=n NC=n MCAST=y BATMAN_V=n SYSFS=n
* unused_symbols linux-4.2 cfg: BLA=n DAT=n DEBUGFS=n DEBUG=y TRACING=n NC=y MCAST=n BATMAN_V=n SYSFS=n
* unused_symbols linux-4.20.13 cfg: BLA=n DAT=n DEBUGFS=n DEBUG=n TRACING=n NC=n MCAST=n BATMAN_V=n SYSFS=n
* unused_symbols linux-4.20.13 cfg: BLA=n DAT=y DEBUGFS=y DEBUG=n TRACING=y NC=y MCAST=n BATMAN_V=y SYSFS=n
* unused_symbols linux-4.3 cfg: BLA=y DAT=n DEBUGFS=n DEBUG=n TRACING=y NC=n MCAST=n BATMAN_V=n SYSFS=n
* unused_symbols linux-4.3 cfg: BLA=y DAT=y DEBUGFS=y DEBUG=y TRACING=y NC=y MCAST=n BATMAN_V=n SYSFS=n
* unused_symbols linux-4.4.176 cfg: BLA=y DAT=y DEBUGFS=y DEBUG=y TRACING=n NC=y MCAST=n BATMAN_V=n SYSFS=n
* unused_symbols linux-4.7 cfg: BLA=y DAT=y DEBUGFS=y DEBUG=y TRACING=y NC=n MCAST=y BATMAN_V=n SYSFS=n
* unused_symbols linux-4.8 cfg: BLA=n DAT=y DEBUGFS=n DEBUG=y TRACING=n NC=n MCAST=n BATMAN_V=y SYSFS=n
* unused_symbols linux-4.8 cfg: BLA=y DAT=n DEBUGFS=n DEBUG=n TRACING=n NC=n MCAST=n BATMAN_V=n SYSFS=n
* unused_symbols linux-5.0 cfg: BLA=n DAT=n DEBUGFS=n DEBUG=n TRACING=y NC=y MCAST=n BATMAN_V=y SYSFS=n
Output of different failed tests
================================
master: difference between net-next and batadv master
-----------------------------------------------------
netnext/Documentation/ABI/testing/sysfs-class-net-batman-adv | 30
netnext/Documentation/ABI/testing/sysfs-class-net-mesh | 108
netnext/Documentation/networking/batman-adv.rst | 222
netnext/MAINTAINERS | 7
netnext/include/uapi/linux/batman_adv.h | 25
netnext/net/batman-adv/Kconfig | 121
netnext/net/batman-adv/Makefile | 50
netnext/net/batman-adv/bat_algo.c | 239
netnext/net/batman-adv/bat_algo.h | 39
netnext/net/batman-adv/bat_iv_ogm.c | 2754 ++++++
netnext/net/batman-adv/bat_iv_ogm.h | 26
netnext/net/batman-adv/bat_v.c | 1162 ++
netnext/net/batman-adv/bat_v.h | 53
netnext/net/batman-adv/bat_v_elp.c | 568 +
netnext/net/batman-adv/bat_v_elp.h | 36
netnext/net/batman-adv/bat_v_ogm.c | 898 +
netnext/net/batman-adv/bat_v_ogm.h | 37
netnext/net/batman-adv/bitarray.c | 101
netnext/net/batman-adv/bitarray.h | 68
netnext/net/batman-adv/bridge_loop_avoidance.c | 2547 +++++
netnext/net/batman-adv/bridge_loop_avoidance.h | 162
netnext/net/batman-adv/debugfs.c | 513 +
netnext/net/batman-adv/debugfs.h | 86
netnext/net/batman-adv/distributed-arp-table.c | 1893 ++++
netnext/net/batman-adv/distributed-arp-table.h | 206
netnext/net/batman-adv/fragmentation.c | 560 +
netnext/net/batman-adv/fragmentation.h | 57
netnext/net/batman-adv/gateway_client.c | 844 +
netnext/net/batman-adv/gateway_client.h | 56
netnext/net/batman-adv/gateway_common.c | 285
netnext/net/batman-adv/gateway_common.h | 51
netnext/net/batman-adv/hard-interface.c | 1106 ++
netnext/net/batman-adv/hard-interface.h | 157
netnext/net/batman-adv/hash.c | 96
netnext/net/batman-adv/hash.h | 170
netnext/net/batman-adv/icmp_socket.c | 421
netnext/net/batman-adv/icmp_socket.h | 51
netnext/net/batman-adv/log.c | 267
netnext/net/batman-adv/log.h | 154
netnext/net/batman-adv/main.c | 691 +
netnext/net/batman-adv/main.h | 398
netnext/net/batman-adv/multicast.c | 1595 +++
netnext/net/batman-adv/multicast.h | 103
netnext/net/batman-adv/netlink.c | 1484 +++
netnext/net/batman-adv/netlink.h | 45
netnext/net/batman-adv/network-coding.c | 1996 ++++
netnext/net/batman-adv/network-coding.h | 133
netnext/net/batman-adv/originator.c | 1554 +++
netnext/net/batman-adv/originator.h | 102
netnext/net/batman-adv/routing.c | 1300 ++
netnext/net/batman-adv/routing.h | 59
netnext/net/batman-adv/send.c | 1014 ++
netnext/net/batman-adv/send.h | 125
netnext/net/batman-adv/soft-interface.c | 1192 ++
netnext/net/batman-adv/soft-interface.h | 44
netnext/net/batman-adv/sysfs.c | 1303 ++
netnext/net/batman-adv/sysfs.h | 72
netnext/net/batman-adv/tp_meter.c | 1505 +++
netnext/net/batman-adv/tp_meter.h | 35
netnext/net/batman-adv/trace.c | 20
netnext/net/batman-adv/trace.h | 84
netnext/net/batman-adv/translation-table.c | 4525 ++++++++++
netnext/net/batman-adv/translation-table.h | 70
netnext/net/batman-adv/tvlv.c | 643 +
netnext/net/batman-adv/tvlv.h | 62
netnext/net/batman-adv/types.h | 2411 +++++
66 files changed, 38779 insertions(+), 12 deletions(-)
master: unused_symbols linux-3.19 cfg: BLA=y DAT=y DEBUGFS=n DEBUG=n TRACING=y NC=n MCAST=n BATMAN_V=y SYSFS=n
---------------------------------------------------------------------------
batadv_gw_bandwidth_set
batadv_netlink_notify_mesh
batadv_netlink_notify_vlan
Statistics
==========
maint
-----
Failed tests: 0
Started build tests: 56
Tested Linux versions: 26
Tested configs: 51
master
------
Failed tests: 25
Started build tests: 54
Tested Linux versions: 27
Tested configs: 54
3 years, 10 months