From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 61C26C54E67 for ; Wed, 27 Mar 2024 12:18:17 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id DD0406B0085; Wed, 27 Mar 2024 08:18:16 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id D80C16B0089; Wed, 27 Mar 2024 08:18:16 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id C6F5B6B008A; Wed, 27 Mar 2024 08:18:16 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id A66576B0085 for ; Wed, 27 Mar 2024 08:18:16 -0400 (EDT) Received: from smtpin03.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 6D1FBA1282 for ; Wed, 27 Mar 2024 12:18:16 +0000 (UTC) X-FDA: 81942721392.03.533EA76 Received: from sin.source.kernel.org (sin.source.kernel.org [145.40.73.55]) by imf12.hostedemail.com (Postfix) with ESMTP id 9F17740010 for ; Wed, 27 Mar 2024 12:18:12 +0000 (UTC) Authentication-Results: imf12.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=tFRPR8Hn; spf=pass (imf12.hostedemail.com: domain of sashal@kernel.org designates 145.40.73.55 as permitted sender) smtp.mailfrom=sashal@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1711541893; a=rsa-sha256; cv=none; b=sL0k/zWp0RFYfkWOAThZm0I8In//Oas+ECbVqsJC3Ht1tLpZ6Cyx+K/mPFKG4O52GtRv61 Ca1DSODLdF4exJAsLZqu+SyJan/YH3NrM5Z++l8Wu1br5dcBFPuVIg56G9aWrlzdQx8mOH 7/gvLcg9RAtoFtUZfWtilmjMy41hBj8= ARC-Authentication-Results: i=1; imf12.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=tFRPR8Hn; spf=pass (imf12.hostedemail.com: domain of sashal@kernel.org designates 145.40.73.55 as permitted sender) smtp.mailfrom=sashal@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1711541893; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:references:dkim-signature; bh=5dc4QyZpJnqpxCMyB9x7RzSBuBxohplmczkvq2gXGXU=; b=5l1Lh1R/s9pnSkzetPp3oZnoGx9fNOpIw+EieEZVZEMptocr6TEjsTClJYh0iW3TPxOVM7 C7DN8hbQNOBO+UK9SC0Vj+NsXo7x33Rl640H4Imx0U0iy9jgBSKECX2K9Jas/BSh8009ga XSeqQEYFPzMvjhHT9KYMR9YWP74s28w= Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by sin.source.kernel.org (Postfix) with ESMTP id 145B8CE25AF; Wed, 27 Mar 2024 12:18:09 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 69AFFC433C7; Wed, 27 Mar 2024 12:18:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1711541888; bh=Two2l8kOoGiBrbC0zbvxiHwHZ+zgAS70Vj/OyvK6Ax8=; h=From:To:Cc:Subject:Date:From; b=tFRPR8Hn3fe9KH4deYDAiKk7OzaN7rwjYYppywpc/yg/z8+hxPvWdi+IvShrfmP2B rrGCc+pRFkHI1R/CiUkpq/OpZG+ZOQmwa75eXU1Y0McOPiSBObd9xpSrO/LEzapdrJ FnpoycPX2YoURjRiW13d5e0A0QX+T+zGWlau3Q9c1itddltsXkVFFttzR+SAos/K0o XQY7eNk16eE9vkSZFrHpIVG0Ufe8HwA6vv72fbGNwi7W3h+liYW9XLB0lIo8B0GRXS hJh/WJP831owyfPwkGaAf6I+bvuPgaVjhI1zYwoS37ybUfQdtODyj8suA7nuslxg34 aSVomfmgODZNA== From: Sasha Levin To: stable@vger.kernel.org, arnd@arndb.de Cc: Andrey Konovalov , Alexander Potapenko , Andrey Ryabinin , Dmitry Vyukov , Marco Elver , Vincenzo Frascino , Andrew Morton , kasan-dev@googlegroups.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: FAILED: Patch "kasan/test: avoid gcc warning for intentional overflow" failed to apply to 5.10-stable tree Date: Wed, 27 Mar 2024 08:18:06 -0400 Message-ID: <20240327121806.2834070-1-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 MIME-Version: 1.0 X-Patchwork-Hint: ignore X-stable: review Content-Transfer-Encoding: 8bit X-Rspamd-Server: rspam08 X-Rspamd-Queue-Id: 9F17740010 X-Stat-Signature: 9nyjmjghgufb53c7pi9pz86szaey3sjm X-Rspam-User: X-HE-Tag: 1711541892-109032 X-HE-Meta: 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 8R4xjLf3 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: The patch below does not apply to the 5.10-stable tree. If someone wants it applied there, or to any other stable or longterm tree, then please email the backport, including the original git commit id to . Thanks, Sasha ------------------ original commit in Linus's tree ------------------ >From e10aea105e9ed14b62a11844fec6aaa87c6935a3 Mon Sep 17 00:00:00 2001 From: Arnd Bergmann Date: Mon, 12 Feb 2024 12:15:52 +0100 Subject: [PATCH] kasan/test: avoid gcc warning for intentional overflow The out-of-bounds test allocates an object that is three bytes too short in order to validate the bounds checking. Starting with gcc-14, this causes a compile-time warning as gcc has grown smart enough to understand the sizeof() logic: mm/kasan/kasan_test.c: In function 'kmalloc_oob_16': mm/kasan/kasan_test.c:443:14: error: allocation of insufficient size '13' for type 'struct ' with size '16' [-Werror=alloc-size] 443 | ptr1 = kmalloc(sizeof(*ptr1) - 3, GFP_KERNEL); | ^ Hide the actual computation behind a RELOC_HIDE() that ensures the compiler misses the intentional bug. Link: https://lkml.kernel.org/r/20240212111609.869266-1-arnd@kernel.org Fixes: 3f15801cdc23 ("lib: add kasan test module") Signed-off-by: Arnd Bergmann Reviewed-by: Andrey Konovalov Cc: Alexander Potapenko Cc: Andrey Ryabinin Cc: Arnd Bergmann Cc: Dmitry Vyukov Cc: Marco Elver Cc: Vincenzo Frascino Cc: Signed-off-by: Andrew Morton --- mm/kasan/kasan_test.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/mm/kasan/kasan_test.c b/mm/kasan/kasan_test.c index 318d9cec111aa..2d8ae4fbe63bb 100644 --- a/mm/kasan/kasan_test.c +++ b/mm/kasan/kasan_test.c @@ -440,7 +440,8 @@ static void kmalloc_oob_16(struct kunit *test) /* This test is specifically crafted for the generic mode. */ KASAN_TEST_NEEDS_CONFIG_ON(test, CONFIG_KASAN_GENERIC); - ptr1 = kmalloc(sizeof(*ptr1) - 3, GFP_KERNEL); + /* RELOC_HIDE to prevent gcc from warning about short alloc */ + ptr1 = RELOC_HIDE(kmalloc(sizeof(*ptr1) - 3, GFP_KERNEL), 0); KUNIT_ASSERT_NOT_ERR_OR_NULL(test, ptr1); ptr2 = kmalloc(sizeof(*ptr2), GFP_KERNEL); -- 2.43.0