Message ID | 20230417205447.1800912-1-arnd@kernel.org |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:b0ea:0:b0:3b6:4342:cba0 with SMTP id b10csp2400869vqo; Mon, 17 Apr 2023 14:04:42 -0700 (PDT) X-Google-Smtp-Source: AKy350a7uOx2RqlKSoYC5EobouUT39D3EusGLoAdz4NsWs6NUUxpNF+W+LdJVPudtunyMy1DLvqq X-Received: by 2002:a05:6a00:2d88:b0:63b:8792:f288 with SMTP id fb8-20020a056a002d8800b0063b8792f288mr10115584pfb.31.1681765482120; Mon, 17 Apr 2023 14:04:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681765482; cv=none; d=google.com; s=arc-20160816; b=Dq28NfGsjyWNd+BkCpydrBDY54/JeCfu722ptvRtmrIdG1hQq0vgOJdxpCVYxFa7RM bdrH5VfXD5E/SLMEp59inuD/j3vqxekBH2XHchTWf4eS92mHw9HYe1DOgApILCppPimF Qrcpg6pp1VM87sz6Wp1pl5nzOg1tWglHPUpshxQbpTkjbpnRxr6Hmp8MSZWDvWPSReok YGF0VBF/iEEDS1PofjsTgH9oey0+bIupPzwZHZczB9iyoJ3kqRIc/kjTzyG4sN7iZtxA f6wzuDQ1fUFQwMNXu7hCwKob7dw3RscqdHYLGiU5/QAJG8IMTcuN8GBqBomc42+pYO6P yydg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=XQ55VehSXvdZM05gcokiTiMQIpoOZdlWnEU4gfDYWgQ=; b=oZefkwSsSfNsaJtC3KmwvAkkzrCu7oOX8ferRL0waX2GoDrDC6hqpHLtVXeqMn8Wpk XVDsIc9nnGTz3o4owNcFZGtX8YZibQANC9hjg4obPi8O+z7EH1Ldx6mhPdqADj80BSFV yMWVmJbTr4ejWdfSYQ/E5xnujtl6jxG9yS3kvafpNW28oapxQB7xn7gUSSTVQni5xGIW l5bHtonPNqAi7tGIwT4Dtt1MstGxtMOF0FaotZjm0X/8EfMOUcaDKllDneozJN/SuWM1 es6U+Ikin/SMJeMtumt/TPzdwufo1I0eB6RnY/Xy8bf4pTcMlCNJ/RXn7NewCSta09b6 mMQg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=U80ja+1S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o14-20020a63e34e000000b00517ab01bb8fsi13614147pgj.100.2023.04.17.14.04.26; Mon, 17 Apr 2023 14:04:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=U80ja+1S; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230416AbjDQU6Z (ORCPT <rfc822;leviz.kernel.dev@gmail.com> + 99 others); Mon, 17 Apr 2023 16:58:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39918 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230361AbjDQU6C (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Mon, 17 Apr 2023 16:58:02 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8C4614C17; Mon, 17 Apr 2023 13:55:49 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 4C1C362A46; Mon, 17 Apr 2023 20:54:55 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5FC1FC433EF; Mon, 17 Apr 2023 20:54:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1681764894; bh=moYYi4bJv8zGeQ0K0+Ne+l5Pi5iujfuXRILl1xpKhX4=; h=From:To:Cc:Subject:Date:From; b=U80ja+1SzcQ202GY/MR/HKPGvEWUeI+Xc2gUAU5uNT5lGU/HSaRvyE8BxOaMLO5tL xRIasBX5T/QwtzhQ+2rLuEKOV9HrGGBzOiYPEOxooWyM6UqZAi9oHAwYHb5ZHo/9t+ VavPigphAxfhdnYbUUn4LS17ceOwbrjNzAmhNzbP67u7QLV6PG9jI9BunFH9GieKBI Rf4w/fSR1d4GJfu2B8zueaVftAseqsHM73MTVSRDQlMQGrlNarbhp6ks3tR8epgFrn i4d56r8ZG895VfwH+ys+nUe4wioyJptqFqAChbslE+wIrTTtBaS4FJV5Vg+L1GmdSp TBCz7Lip00L9w== From: Arnd Bergmann <arnd@kernel.org> To: Kalle Valo <kvalo@kernel.org>, "David S. Miller" <davem@davemloft.net>, Eric Dumazet <edumazet@google.com>, Jakub Kicinski <kuba@kernel.org>, Paolo Abeni <pabeni@redhat.com> Cc: Arnd Bergmann <arnd@arndb.de>, Johannes Berg <johannes.berg@intel.com>, Manikanta Pubbisetty <quic_mpubbise@quicinc.com>, Wen Gong <quic_wgong@quicinc.com>, Baochen Qiang <quic_bqiang@quicinc.com>, Sowmiya Sree Elavalagan <quic_ssreeela@quicinc.com>, ath11k@lists.infradead.org, linux-wireless@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, ath12k@lists.infradead.org Subject: [PATCH] wireless: ath: work around false-positive stringop-overread warning Date: Mon, 17 Apr 2023 22:54:20 +0200 Message-Id: <20230417205447.1800912-1-arnd@kernel.org> X-Mailer: git-send-email 2.39.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1763458922063813176?= X-GMAIL-MSGID: =?utf-8?q?1763458922063813176?= |
Series |
wireless: ath: work around false-positive stringop-overread warning
|
|
Commit Message
Arnd Bergmann
April 17, 2023, 8:54 p.m. UTC
From: Arnd Bergmann <arnd@arndb.de> In a rare arm64 randconfig build, I got multiple warnings for ath11k and ath12k: In function 'ath11k_peer_assoc_h_ht', inlined from 'ath11k_peer_assoc_prepare' at drivers/net/wireless/ath/ath11k/mac.c:2665:2: drivers/net/wireless/ath/ath11k/mac.c:1709:13: error: 'ath11k_peer_assoc_h_ht_masked' reading 10 bytes from a region of size 0 [-Werror=stringop-overread] 1709 | if (ath11k_peer_assoc_h_ht_masked(ht_mcs_mask)) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This happens whenever gcc-13 fails to inline one of the functions that take a fixed-length array argument but gets passed a pointer. Change these functions to all take a regular pointer argument instead. Signed-off-by: Arnd Bergmann <arnd@arndb.de> --- drivers/net/wireless/ath/ath11k/mac.c | 12 ++++++------ drivers/net/wireless/ath/ath12k/mac.c | 8 ++++---- 2 files changed, 10 insertions(+), 10 deletions(-)
Comments
On Mon, Apr 17, 2023 at 10:54:20PM +0200, Arnd Bergmann wrote: > From: Arnd Bergmann <arnd@arndb.de> > > In a rare arm64 randconfig build, I got multiple warnings for ath11k > and ath12k: > > In function 'ath11k_peer_assoc_h_ht', > inlined from 'ath11k_peer_assoc_prepare' at drivers/net/wireless/ath/ath11k/mac.c:2665:2: > drivers/net/wireless/ath/ath11k/mac.c:1709:13: error: 'ath11k_peer_assoc_h_ht_masked' reading 10 bytes from a region of size 0 [-Werror=stringop-overread] > 1709 | if (ath11k_peer_assoc_h_ht_masked(ht_mcs_mask)) > | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > > This happens whenever gcc-13 fails to inline one of the functions > that take a fixed-length array argument but gets passed a pointer. > > Change these functions to all take a regular pointer argument > instead. > > Signed-off-by: Arnd Bergmann <arnd@arndb.de> Reviewed-by: Simon Horman <simon.horman@corigine.com> Note: I was not able to reproduce the problem described above.
Arnd Bergmann <arnd@kernel.org> writes: > From: Arnd Bergmann <arnd@arndb.de> > > In a rare arm64 randconfig build, I got multiple warnings for ath11k > and ath12k: > > In function 'ath11k_peer_assoc_h_ht', > inlined from 'ath11k_peer_assoc_prepare' at drivers/net/wireless/ath/ath11k/mac.c:2665:2: > drivers/net/wireless/ath/ath11k/mac.c:1709:13: error: 'ath11k_peer_assoc_h_ht_masked' reading 10 bytes from a region of size 0 [-Werror=stringop-overread] > 1709 | if (ath11k_peer_assoc_h_ht_masked(ht_mcs_mask)) > | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > > This happens whenever gcc-13 fails to inline one of the functions > that take a fixed-length array argument but gets passed a pointer. > > Change these functions to all take a regular pointer argument > instead. > > Signed-off-by: Arnd Bergmann <arnd@arndb.de> s/wireless:/wifi:/ but I can fix that. In a awat it's a shame to lose the explicit length but I guess there's no other way to fix this? Also I hope you find the time to add GCC 13 to crosstool :) Related to this, last year we had a similar warning with GCC 11 for which I added this not-so-pretty workaround: abf93f369419 wifi: ath11k: mac: fix reading 16 bytes from a region of size 0 warning https://git.kernel.org/linus/abf93f369419
On Mon, May 8, 2023, at 10:44, Kalle Valo wrote: > Arnd Bergmann <arnd@kernel.org> writes: > >> From: Arnd Bergmann <arnd@arndb.de> >> >> In a rare arm64 randconfig build, I got multiple warnings for ath11k >> and ath12k: >> >> In function 'ath11k_peer_assoc_h_ht', >> inlined from 'ath11k_peer_assoc_prepare' at drivers/net/wireless/ath/ath11k/mac.c:2665:2: >> drivers/net/wireless/ath/ath11k/mac.c:1709:13: error: 'ath11k_peer_assoc_h_ht_masked' reading 10 bytes from a region of size 0 [-Werror=stringop-overread] >> 1709 | if (ath11k_peer_assoc_h_ht_masked(ht_mcs_mask)) >> | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >> >> This happens whenever gcc-13 fails to inline one of the functions >> that take a fixed-length array argument but gets passed a pointer. >> >> Change these functions to all take a regular pointer argument >> instead. >> >> Signed-off-by: Arnd Bergmann <arnd@arndb.de> > > s/wireless:/wifi:/ but I can fix that. Ok, thanks! > In a awat it's a shame to lose the explicit length but I guess there's > no other way to fix this? There might be, but I couldn't figure out a way that works. > Also I hope you find the time to add GCC 13 to crosstool :) Related to > this I uploaded gcc-13.1.0 binaries last week, but still need to update the html page, so it's not yet linked. You can navigate the directories from the gcc-12 builds. Arnd
"Arnd Bergmann" <arnd@arndb.de> writes: > On Mon, May 8, 2023, at 10:44, Kalle Valo wrote: > >> Arnd Bergmann <arnd@kernel.org> writes: >> >>> From: Arnd Bergmann <arnd@arndb.de> >>> >>> In a rare arm64 randconfig build, I got multiple warnings for ath11k >>> and ath12k: >>> >>> In function 'ath11k_peer_assoc_h_ht', >>> inlined from 'ath11k_peer_assoc_prepare' at drivers/net/wireless/ath/ath11k/mac.c:2665:2: >>> drivers/net/wireless/ath/ath11k/mac.c:1709:13: error: 'ath11k_peer_assoc_h_ht_masked' reading 10 bytes from a region of size 0 [-Werror=stringop-overread] >>> 1709 | if (ath11k_peer_assoc_h_ht_masked(ht_mcs_mask)) >>> | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >>> >>> This happens whenever gcc-13 fails to inline one of the functions >>> that take a fixed-length array argument but gets passed a pointer. >>> >>> Change these functions to all take a regular pointer argument >>> instead. >>> >>> Signed-off-by: Arnd Bergmann <arnd@arndb.de> >> >> s/wireless:/wifi:/ but I can fix that. > > Ok, thanks! > >> In a awat it's a shame to lose the explicit length but I guess there's >> no other way to fix this? > > There might be, but I couldn't figure out a way that works. Ok. >> Also I hope you find the time to add GCC 13 to crosstool :) Related to >> this > > I uploaded gcc-13.1.0 binaries last week, but still need to > update the html page, so it's not yet linked. You can navigate > the directories from the gcc-12 builds. Thanks! I was able to find the build[1] but having an issue: $ ./x86_64-linux-gcc -v ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version `GLIBC_2.35' not found (required by ./x86_64-linux-gcc) ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version `GLIBC_2.32' not found (required by ./x86_64-linux-gcc) ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version `GLIBC_2.33' not found (required by ./x86_64-linux-gcc) ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version `GLIBC_2.36' not found (required by ./x86_64-linux-gcc) ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version `GLIBC_2.34' not found (required by ./x86_64-linux-gcc) With older GCC versions from your page I don't have this problem. I'm using Debian 10 still so so is my libc too old? ii libc6:amd64 2.28-10+deb10u2:amd6 GNU C Library: Shared libraries [1] https://mirrors.edge.kernel.org/pub/tools/crosstool/files/bin/x86_64/13.1.0/x86_64-gcc-13.1.0-nolibc-x86_64-linux.tar.gz
On Mon, May 8, 2023, at 16:57, Kalle Valo wrote: > "Arnd Bergmann" <arnd@arndb.de> writes: >> >> I uploaded gcc-13.1.0 binaries last week, but still need to >> update the html page, so it's not yet linked. You can navigate >> the directories from the gcc-12 builds. > > Thanks! I was able to find the build[1] but having an issue: > > $ ./x86_64-linux-gcc -v > ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version > `GLIBC_2.35' not found (required by ./x86_64-linux-gcc) > ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version > `GLIBC_2.32' not found (required by ./x86_64-linux-gcc) > ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version > `GLIBC_2.33' not found (required by ./x86_64-linux-gcc) > ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version > `GLIBC_2.36' not found (required by ./x86_64-linux-gcc) > ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version > `GLIBC_2.34' not found (required by ./x86_64-linux-gcc) > > With older GCC versions from your page I don't have this problem. I'm > using Debian 10 still so so is my libc too old? (dropping most Cc) Indeed, thanks for the report, I forgot about that issue. I used to build the cross toolchains in an old Ubuntu 16.04 chroot to avoid that issue, and I linked all other dependencies statically. The gcc-13.1.0 builds are the first ones I did on an arm64 machine, so I had to create a new build environment and started out with just my normal Debian testing rootfs, which caused me enough issues to figure out first. I had previously experimented with linking statically against musl to avoid all other dependencies, but that ended up with slower binaries because the default memory allocator in musl doesn't work that well for gcc, and I never quite figured out how to pick a different memory allocator, or which one to use. I should probably just pick an older Debian release that is new enough to contain cross compilers for arm64 and x86 and then set up the same kind of chroot I had in before. Arnd
"Arnd Bergmann" <arnd@arndb.de> writes: > On Mon, May 8, 2023, at 16:57, Kalle Valo wrote: >> "Arnd Bergmann" <arnd@arndb.de> writes: >>> >>> I uploaded gcc-13.1.0 binaries last week, but still need to >>> update the html page, so it's not yet linked. You can navigate >>> the directories from the gcc-12 builds. >> >> Thanks! I was able to find the build[1] but having an issue: >> >> $ ./x86_64-linux-gcc -v >> ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version >> `GLIBC_2.35' not found (required by ./x86_64-linux-gcc) >> ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version >> `GLIBC_2.32' not found (required by ./x86_64-linux-gcc) >> ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version >> `GLIBC_2.33' not found (required by ./x86_64-linux-gcc) >> ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version >> `GLIBC_2.36' not found (required by ./x86_64-linux-gcc) >> ./x86_64-linux-gcc: /lib/x86_64-linux-gnu/libc.so.6: version >> `GLIBC_2.34' not found (required by ./x86_64-linux-gcc) >> >> With older GCC versions from your page I don't have this problem. I'm >> using Debian 10 still so so is my libc too old? > > (dropping most Cc) > > Indeed, thanks for the report, I forgot about that issue. I used > to build the cross toolchains in an old Ubuntu 16.04 chroot to avoid > that issue, and I linked all other dependencies statically. > > The gcc-13.1.0 builds are the first ones I did on an arm64 machine, > so I had to create a new build environment and started out with > just my normal Debian testing rootfs, which caused me enough issues > to figure out first. > > I had previously experimented with linking statically against > musl to avoid all other dependencies, but that ended up with > slower binaries because the default memory allocator in musl > doesn't work that well for gcc, and I never quite figured out > how to pick a different memory allocator, or which one to use. > > I should probably just pick an older Debian release that is new > enough to contain cross compilers for arm64 and x86 and then > set up the same kind of chroot I had in before. Thanks! I really should update to Debian 11 but I have been lazy :) But I doubt that would have helped either as it looks like it has libc6 v2.31: https://packages.debian.org/bullseye/libc6 I'm disappointed glibc creates so uncompatible binaries, feels like they don't create about backwards compatibility :/
Arnd Bergmann <arnd@kernel.org> wrote: > In a rare arm64 randconfig build, I got multiple warnings for ath11k > and ath12k: > > In function 'ath11k_peer_assoc_h_ht', > inlined from 'ath11k_peer_assoc_prepare' at drivers/net/wireless/ath/ath11k/mac.c:2665:2: > drivers/net/wireless/ath/ath11k/mac.c:1709:13: error: 'ath11k_peer_assoc_h_ht_masked' reading 10 bytes from a region of size 0 [-Werror=stringop-overread] > 1709 | if (ath11k_peer_assoc_h_ht_masked(ht_mcs_mask)) > | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > > This happens whenever gcc-13 fails to inline one of the functions > that take a fixed-length array argument but gets passed a pointer. > > Change these functions to all take a regular pointer argument > instead. > > Signed-off-by: Arnd Bergmann <arnd@arndb.de> > Signed-off-by: Kalle Valo <quic_kvalo@quicinc.com> Patch applied to ath-next branch of ath.git, thanks. 695df2f417d2 wifi: ath: work around false-positive stringop-overread warning
On Mon, May 8, 2023, at 17:07, Arnd Bergmann wrote: > On Mon, May 8, 2023, at 16:57, Kalle Valo wrote: >> With older GCC versions from your page I don't have this problem. I'm >> using Debian 10 still so so is my libc too old? > > (dropping most Cc) > > Indeed, thanks for the report, I forgot about that issue. I used > to build the cross toolchains in an old Ubuntu 16.04 chroot to avoid > that issue, and I linked all other dependencies statically. > > The gcc-13.1.0 builds are the first ones I did on an arm64 machine, > so I had to create a new build environment and started out with > just my normal Debian testing rootfs, which caused me enough issues > to figure out first. > > I had previously experimented with linking statically against > musl to avoid all other dependencies, but that ended up with > slower binaries because the default memory allocator in musl > doesn't work that well for gcc, and I never quite figured out > how to pick a different memory allocator, or which one to use. > > I should probably just pick an older Debian release that is new > enough to contain cross compilers for arm64 and x86 and then > set up the same kind of chroot I had in before. It took me a while, but now I have a working build setup in a Debian Buster schroot with gcc-13 as the main compiler, and I updated the gcc-13.1 binaries with those, as well as uploading gcc-11.4 and gcc-12.3 build the same way. I have only tested the binaries on arm64 Debian testing, could you see if the new x86 builds work for you? Arnd
"Arnd Bergmann" <arnd@kernel.org> writes: > On Mon, May 8, 2023, at 17:07, Arnd Bergmann wrote: > >> On Mon, May 8, 2023, at 16:57, Kalle Valo wrote: >>> With older GCC versions from your page I don't have this problem. I'm >>> using Debian 10 still so so is my libc too old? >> >> (dropping most Cc) >> >> Indeed, thanks for the report, I forgot about that issue. I used >> to build the cross toolchains in an old Ubuntu 16.04 chroot to avoid >> that issue, and I linked all other dependencies statically. >> >> The gcc-13.1.0 builds are the first ones I did on an arm64 machine, >> so I had to create a new build environment and started out with >> just my normal Debian testing rootfs, which caused me enough issues >> to figure out first. >> >> I had previously experimented with linking statically against >> musl to avoid all other dependencies, but that ended up with >> slower binaries because the default memory allocator in musl >> doesn't work that well for gcc, and I never quite figured out >> how to pick a different memory allocator, or which one to use. >> >> I should probably just pick an older Debian release that is new >> enough to contain cross compilers for arm64 and x86 and then >> set up the same kind of chroot I had in before. > > It took me a while, but now I have a working build setup > in a Debian Buster schroot with gcc-13 as the main compiler, > and I updated the gcc-13.1 binaries with those, as well as > uploading gcc-11.4 and gcc-12.3 build the same way. > > I have only tested the binaries on arm64 Debian testing, > could you see if the new x86 builds work for you? I tested GCC 12.3 and 13.1 on x86 Debian 10, they both worked perfectly. Thank you!
diff --git a/drivers/net/wireless/ath/ath11k/mac.c b/drivers/net/wireless/ath/ath11k/mac.c index cad832e0e6b8..393669be7847 100644 --- a/drivers/net/wireless/ath/ath11k/mac.c +++ b/drivers/net/wireless/ath/ath11k/mac.c @@ -433,7 +433,7 @@ u8 ath11k_mac_bitrate_to_idx(const struct ieee80211_supported_band *sband, } static u32 -ath11k_mac_max_ht_nss(const u8 ht_mcs_mask[IEEE80211_HT_MCS_MASK_LEN]) +ath11k_mac_max_ht_nss(const u8 *ht_mcs_mask) { int nss; @@ -445,7 +445,7 @@ ath11k_mac_max_ht_nss(const u8 ht_mcs_mask[IEEE80211_HT_MCS_MASK_LEN]) } static u32 -ath11k_mac_max_vht_nss(const u16 vht_mcs_mask[NL80211_VHT_NSS_MAX]) +ath11k_mac_max_vht_nss(const u16 *vht_mcs_mask) { int nss; @@ -457,7 +457,7 @@ ath11k_mac_max_vht_nss(const u16 vht_mcs_mask[NL80211_VHT_NSS_MAX]) } static u32 -ath11k_mac_max_he_nss(const u16 he_mcs_mask[NL80211_HE_NSS_MAX]) +ath11k_mac_max_he_nss(const u16 *he_mcs_mask) { int nss; @@ -1658,7 +1658,7 @@ static void ath11k_peer_assoc_h_rates(struct ath11k *ar, } static bool -ath11k_peer_assoc_h_ht_masked(const u8 ht_mcs_mask[IEEE80211_HT_MCS_MASK_LEN]) +ath11k_peer_assoc_h_ht_masked(const u8 *ht_mcs_mask) { int nss; @@ -1670,7 +1670,7 @@ ath11k_peer_assoc_h_ht_masked(const u8 ht_mcs_mask[IEEE80211_HT_MCS_MASK_LEN]) } static bool -ath11k_peer_assoc_h_vht_masked(const u16 vht_mcs_mask[]) +ath11k_peer_assoc_h_vht_masked(const u16 *vht_mcs_mask) { int nss; @@ -2065,7 +2065,7 @@ static u16 ath11k_peer_assoc_h_he_limit(u16 tx_mcs_set, } static bool -ath11k_peer_assoc_h_he_masked(const u16 he_mcs_mask[NL80211_HE_NSS_MAX]) +ath11k_peer_assoc_h_he_masked(const u16 *he_mcs_mask) { int nss; diff --git a/drivers/net/wireless/ath/ath12k/mac.c b/drivers/net/wireless/ath/ath12k/mac.c index d683a0668989..ea2313b6b759 100644 --- a/drivers/net/wireless/ath/ath12k/mac.c +++ b/drivers/net/wireless/ath/ath12k/mac.c @@ -381,7 +381,7 @@ u8 ath12k_mac_bitrate_to_idx(const struct ieee80211_supported_band *sband, } static u32 -ath12k_mac_max_ht_nss(const u8 ht_mcs_mask[IEEE80211_HT_MCS_MASK_LEN]) +ath12k_mac_max_ht_nss(const u8 *ht_mcs_mask) { int nss; @@ -393,7 +393,7 @@ ath12k_mac_max_ht_nss(const u8 ht_mcs_mask[IEEE80211_HT_MCS_MASK_LEN]) } static u32 -ath12k_mac_max_vht_nss(const u16 vht_mcs_mask[NL80211_VHT_NSS_MAX]) +ath12k_mac_max_vht_nss(const u16 *vht_mcs_mask) { int nss; @@ -1303,7 +1303,7 @@ static void ath12k_peer_assoc_h_rates(struct ath12k *ar, } static bool -ath12k_peer_assoc_h_ht_masked(const u8 ht_mcs_mask[IEEE80211_HT_MCS_MASK_LEN]) +ath12k_peer_assoc_h_ht_masked(const u8 *ht_mcs_mask) { int nss; @@ -1315,7 +1315,7 @@ ath12k_peer_assoc_h_ht_masked(const u8 ht_mcs_mask[IEEE80211_HT_MCS_MASK_LEN]) } static bool -ath12k_peer_assoc_h_vht_masked(const u16 vht_mcs_mask[NL80211_VHT_NSS_MAX]) +ath12k_peer_assoc_h_vht_masked(const u16 *vht_mcs_mask) { int nss;