From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5161CC46CD4 for ; Wed, 27 Dec 2023 22:29:00 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id C8FCB6B007E; Wed, 27 Dec 2023 17:28:59 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id C3C3B6B0081; Wed, 27 Dec 2023 17:28:59 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B049E6B0082; Wed, 27 Dec 2023 17:28:59 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 9DE3A6B007E for ; Wed, 27 Dec 2023 17:28:59 -0500 (EST) Received: from smtpin13.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 6C9E9140719 for ; Wed, 27 Dec 2023 22:28:59 +0000 (UTC) X-FDA: 81614039598.13.3269F46 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.11]) by imf22.hostedemail.com (Postfix) with ESMTP id 09B45C0002 for ; Wed, 27 Dec 2023 22:28:55 +0000 (UTC) Authentication-Results: imf22.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=QSAjSRnA; spf=pass (imf22.hostedemail.com: domain of lkp@intel.com designates 192.198.163.11 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1703716136; a=rsa-sha256; cv=none; b=n+ZHFYpReTK5L8wcig6wv3a73usSUg5DmzE5a892GxcqEvNxZocWJYol+4R8eygJSlL8XF lXMNAz+5ofJt+Tbgj6vkj1N5QdRFF3ewjUc4RU3LuNUVAyBmXBec42MQzU9AVlJIfPB/W2 EDTdtZlqKaWx/AYZDDRtUhiU97WQsBk= ARC-Authentication-Results: i=1; imf22.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=QSAjSRnA; spf=pass (imf22.hostedemail.com: domain of lkp@intel.com designates 192.198.163.11 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1703716136; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=4Da+Fmb1Vvcxbep30ZUBOmDDGIjSH58Psmv2LEZR3p4=; b=qyx/XB+OsS11OVEusysBfRUt28iiQ83dYjeg8V/oOAfQ/A4Wa0uwKA7yyfCuCRCTgGNgyy Ly/NfyxybJ9Euux6uvVlN9ZDSxvVHMcWl+HX37g07imXPil98Y+jn4XANKLjg7nS8xzsuH nmxshhyYpxvnFFGRq1DLuYuF+dxsqZw= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1703716136; x=1735252136; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=uLvKxjmPAQNCDQWSKf+PXALi8yQg+Zp/bXNKwKOpNE4=; b=QSAjSRnAjtY5vkRzvC3Q8OLDBT73XZ6fpDxJcOPpTHtujkaDRb1qAkDo O9naM+h233jmMRKF7uNELHDyHgePSBAhkkR7AcFLouWtlMmrBz5XTX/4S oLfhDi3K0j3bA2bCBiu/gR8d+p+DkZbVCa01AA9scHIvg4ZulyZHigDVU uVarNxpfDL/Zhm6B5qWJ6lYrFIJFLGiYW/autmbjnxRLzvwPfiHjhS1/y DV5dogGarr1IQ1cB43//BozgybfkdnHSVpqowznapltHb2WoLz8/rnjhC P8tzODiUoaIFL93txdUt/NLVlCDgoaCWBjOvA0BCnFbh/05J0GP7FvYau w==; X-IronPort-AV: E=McAfee;i="6600,9927,10936"; a="3335451" X-IronPort-AV: E=Sophos;i="6.04,310,1695711600"; d="scan'208";a="3335451" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmvoesa105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Dec 2023 14:28:54 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10936"; a="778340767" X-IronPort-AV: E=Sophos;i="6.04,310,1695711600"; d="scan'208";a="778340767" Received: from lkp-server02.sh.intel.com (HELO b07ab15da5fe) ([10.239.97.151]) by orsmga002.jf.intel.com with ESMTP; 27 Dec 2023 14:28:50 -0800 Received: from kbuild by b07ab15da5fe with local (Exim 4.96) (envelope-from ) id 1rIcOO-000FnF-1P; Wed, 27 Dec 2023 22:28:48 +0000 Date: Thu, 28 Dec 2023 06:28:32 +0800 From: kernel test robot To: andrey.konovalov@linux.dev, Marco Elver , Andrew Morton Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, Linux Memory Management List , Andrey Konovalov , Alexander Potapenko , Dmitry Vyukov , Andrey Ryabinin , kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH mm] kasan: stop leaking stack trace handles Message-ID: <202312280603.WqS3sWfa-lkp@intel.com> References: <20231226225121.235865-1-andrey.konovalov@linux.dev> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231226225121.235865-1-andrey.konovalov@linux.dev> X-Rspamd-Server: rspam08 X-Rspamd-Queue-Id: 09B45C0002 X-Stat-Signature: qyig33wdem9q7p4oa3ghczugimrm5dbq X-Rspam-User: X-HE-Tag: 1703716135-990754 X-HE-Meta: U2FsdGVkX18wTj9zyVZu6/+kkLKnrK0upjeU9fB3WUI5s1d0N8Xj/zLmhTKRGK3DvMZzJIotdSfRqgLBDgHorWyvS/YxCr2pGx+dWaQ/c1HGinGFEvLke0jn+3SwRTCdRROoxyMBPVwZ1EQ+XIFeteYduj+PWcLbJKyGJxw2UUdz24rg5GFa2Q8EmHEjE3/vhVoJgQuLxoQPy7X/I0DooVWHBuXnp25yFnyxdgpHVdcxUIRl+fTATCYJCGKstmW5IjEFaHnXRCgjQMHctf/bwEeob2nA+9OoblOydmrXkgruuS+xcDvxDKY5/ImpRSFi+L16zrOQGFb+bBiiHYNS6w/mKmQXu/FYGwwtcp2Hp5k+l+2WK5uaErK8yxJjYQ3xY80SWG3JrZNvvNZy2y/drN5GySa2rGUAkpS74SJOzgV2ro2J/shL/3X7IANlcphffT2vpAU9ldIBpumNZTRw22zbs4Vbg9kFP1aFMjNmf9AQ+2AIMMSfiOoxn16SGx3EakImUBl6pQpoZUdoo/bt3/gq0395qB2o8HOOrPNiUl+9JHnGt0EofWzKjP77SgBEG4frdaJVbQxJlWO5Q5hotgEqp+vp1oCHBzZzqeIJoFbJzOKh8VJUzSsB8pEZkhhnxTHkUFgBB7zZmxtRo3JuNqjuoXCspbw1OW1PEHGWFwPqtgRwA6eOxY8VJgPSRR7rCBmcPBVvmZTuKJ1IPpUf+OjNgGj0mTI+tcib1wfEBKIzNxJCUN2QGjDzljrDaH2KU46wltKf88YZMOa6W4PtGnlzEudbTXn5izwkg88+gtPdPeCa7m+jC9gfwq8mHUA9FXSeaG/9OVS35ViRws80zLn6vTG6pnA3rxsceK2lGr4msAfee7+uaJWfFpCEgy67V3sVoM3Z1/aCF208gHGcH0++GkWBey3c+bZNPgTDtJ5pQFHab4dJ+4BFCS1yBr+9p8XtWJVvKB4QVBKQsfL uEg5Vyz5 ZFoctoATUE4lTI87YUQ58xKaN3FerPVwaN0Q5AptOe5Q4KEerZmebuOYv85B4wtucZFlNCkXS9gPzR1VSvk7l3FxT0a6eugGNlT15VrIswu9qpC1Gndbpk9F8hHCTGUoU/2ufnJt4Bn+yFa0RtmSE5itWZRvLHl6saWhSTdVxl1ZY29rEtcRTmn63By4c1ke+PLdOugB7W0FLY2cecA5EJr9BI1EZzZDxv8/DraZwOKu20Y8x1/wMnCHwmjZalTr6n3EyT+plvI3hVr8mOKoel9sBOjQmdsXTjQFEXFS8Sz+6FEXKNTY15cDwfkdAj7HwkvHWomQBTZ+byugjhp3Cd5Zx5soEqgtOwiq8f3A1Pmwb5ZJXRNVaeMfXqJTt5MMilYY8YH++drrEhCI6i4jdI9xaStlnqfWT++x+BQKVXyXSzl5xCgh4YzF7vg== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi, kernel test robot noticed the following build warnings: [auto build test WARNING on akpm-mm/mm-everything] [cannot apply to linus/master v6.7-rc7 next-20231222] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/andrey-konovalov-linux-dev/kasan-stop-leaking-stack-trace-handles/20231227-065314 base: https://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm.git mm-everything patch link: https://lore.kernel.org/r/20231226225121.235865-1-andrey.konovalov%40linux.dev patch subject: [PATCH mm] kasan: stop leaking stack trace handles config: arm-randconfig-002-20231227 (https://download.01.org/0day-ci/archive/20231228/202312280603.WqS3sWfa-lkp@intel.com/config) compiler: ClangBuiltLinux clang version 17.0.6 (https://github.com/llvm/llvm-project 6009708b4367171ccdbf4b5905cb6a803753fe18) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231228/202312280603.WqS3sWfa-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202312280603.WqS3sWfa-lkp@intel.com/ All warnings (new ones prefixed by >>): >> mm/kasan/generic.c:506:6: warning: no previous prototype for function 'release_alloc_meta' [-Wmissing-prototypes] 506 | void release_alloc_meta(struct kasan_alloc_meta *meta) | ^ mm/kasan/generic.c:506:1: note: declare 'static' if the function is not intended to be used outside of this translation unit 506 | void release_alloc_meta(struct kasan_alloc_meta *meta) | ^ | static >> mm/kasan/generic.c:517:6: warning: no previous prototype for function 'release_free_meta' [-Wmissing-prototypes] 517 | void release_free_meta(const void *object, struct kasan_free_meta *meta) | ^ mm/kasan/generic.c:517:1: note: declare 'static' if the function is not intended to be used outside of this translation unit 517 | void release_free_meta(const void *object, struct kasan_free_meta *meta) | ^ | static 2 warnings generated. vim +/release_alloc_meta +506 mm/kasan/generic.c 505 > 506 void release_alloc_meta(struct kasan_alloc_meta *meta) 507 { 508 /* Evict the stack traces from stack depot. */ 509 stack_depot_put(meta->alloc_track.stack); 510 stack_depot_put(meta->aux_stack[0]); 511 stack_depot_put(meta->aux_stack[1]); 512 513 /* Zero out alloc meta to mark it as invalid. */ 514 __memset(meta, 0, sizeof(*meta)); 515 } 516 > 517 void release_free_meta(const void *object, struct kasan_free_meta *meta) 518 { 519 /* Check if free meta is valid. */ 520 if (*(u8 *)kasan_mem_to_shadow(object) != KASAN_SLAB_FREE_META) 521 return; 522 523 /* Evict the stack trace from the stack depot. */ 524 stack_depot_put(meta->free_track.stack); 525 526 /* Mark free meta as invalid. */ 527 *(u8 *)kasan_mem_to_shadow(object) = KASAN_SLAB_FREE; 528 } 529 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki