From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id DBD38CCF9E3 for ; Tue, 11 Nov 2025 10:42:28 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id DEB908E000E; Tue, 11 Nov 2025 05:42:27 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id DC3728E0002; Tue, 11 Nov 2025 05:42:27 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id CD91A8E000E; Tue, 11 Nov 2025 05:42:27 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id B9DC08E0002 for ; Tue, 11 Nov 2025 05:42:27 -0500 (EST) Received: from smtpin22.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id 6B68C1A04E6 for ; Tue, 11 Nov 2025 10:42:27 +0000 (UTC) X-FDA: 84097987134.22.0135E47 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.8]) by imf09.hostedemail.com (Postfix) with ESMTP id A3011140006 for ; Tue, 11 Nov 2025 10:42:24 +0000 (UTC) Authentication-Results: imf09.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=g2A9N8zz; spf=pass (imf09.hostedemail.com: domain of lkp@intel.com designates 192.198.163.8 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1762857745; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=c21QD59kFVW2SuW+L8c9RHan5yxSQF77DyQ4U/1xy/w=; b=m/6Ut7zYZqa2TZnaEC/+sPMmfrUGMvr/WnEMwbvDcHnLofzFXZnoAELi96nwug1olHYBRD pl+ni6XgEPemslZ4yz8lLpO9zuZuXpAg1nRWliE4LTOsB8pL9Ve3Y1IQVkl2slNhlk3xUT JH8T0Yb7ARhTvvyev0XInBdwF0eM5Qg= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1762857745; a=rsa-sha256; cv=none; b=TJtA6EWuQJW/RjVMinw6veyiK5clBZwF+4951KhIcrrAhophDOSVH/WMZKfxM41idirMIO +loDGu08gbYXDeRolz7CzIfwNRJ8lK9SplCUm6BLU3YImx/I2CVRSXcENM9G4oTHdb60cm v22OIR0hAT8gAndRqhz0VYZUzfoNaWc= ARC-Authentication-Results: i=1; imf09.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=g2A9N8zz; spf=pass (imf09.hostedemail.com: domain of lkp@intel.com designates 192.198.163.8 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1762857745; x=1794393745; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=tB8mAgojGV9nhPdqVPEff3EJbjDbspKUEJpWSxMHVu8=; b=g2A9N8zzxvT1cZCBv8O676PW0Eatze+RXedXKa95Q33NJst0sOi3E0py WSOGX8RpzU0M8ZsDd3DWSbfpmSVVdW8hbgimwJu00J7oLr/mFIXCNdNa/ z3aKyJ7159MU6Av77AMbCjl+5TNCaHR9av+eO2X6MBZjW8WDk3R2J8UOJ z9NoEwEr+ytVpMKv/QIbUvtnOsK8cqi3AF7hZzHSL8T+A8kbnpUdt1i4R mEPqOOjGl9ROXcQamaOcW4ZPGucLTETKl8s1rGi52wAaQomRwWIA/nR9s 4o9xzKrCVB8j9NbN0nYKO2/DwzJA46gWLhsl6uipL/mhAkRQx6iTOjAo/ g==; X-CSE-ConnectionGUID: p8tROmqlQLGEzzdqF8sXmg== X-CSE-MsgGUID: ZT9DsLftR6mDHzu+iBfhUg== X-IronPort-AV: E=McAfee;i="6800,10657,11609"; a="82545880" X-IronPort-AV: E=Sophos;i="6.19,296,1754982000"; d="scan'208";a="82545880" Received: from fmviesa008.fm.intel.com ([10.60.135.148]) by fmvoesa102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Nov 2025 02:42:23 -0800 X-CSE-ConnectionGUID: RlIPGVlVQkekIwQceNRLOw== X-CSE-MsgGUID: frrxrfjJTReeK7pqwYE7LA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.19,296,1754982000"; d="scan'208";a="189195155" Received: from lkp-server01.sh.intel.com (HELO 7b01c990427b) ([10.239.97.150]) by fmviesa008.fm.intel.com with ESMTP; 11 Nov 2025 02:42:20 -0800 Received: from kbuild by 7b01c990427b with local (Exim 4.96) (envelope-from ) id 1vIlpJ-00033R-3B; Tue, 11 Nov 2025 10:42:17 +0000 Date: Tue, 11 Nov 2025 18:42:14 +0800 From: kernel test robot To: Alejandro Colomar , linux-kernel@vger.kernel.org Cc: oe-kbuild-all@lists.linux.dev, Alejandro Colomar , Marco Elver , Kees Cook , Christopher Bazley , Alexander Potapenko , Dmitry Vyukov , Jann Horn , Andrew Morton , Linux Memory Management List , Rasmus Villemoes , Michal Hocko , Al Viro Subject: Re: [PATCH v1 2/3] mm: Fix benign off-by-one bugs Message-ID: <202511111838.DEnuGlic-lkp@intel.com> References: <87445e701574058b142e036c3b8a0f505086ab64.1758806023.git.alx@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <87445e701574058b142e036c3b8a0f505086ab64.1758806023.git.alx@kernel.org> X-Stat-Signature: dg1td1qe31qp3mjzabcyiby7u6ughsej X-Rspam-User: X-Rspamd-Queue-Id: A3011140006 X-Rspamd-Server: rspam01 X-HE-Tag: 1762857744-585145 X-HE-Meta: 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 1B32JPyp 3PSVXvx7W2+c65JTGkFR8vV5LAAuj7Ok7Ai1CvMdP68U6mAbV6sjL6HfF2FshMdpOpGJK7Ojp0Djep4Gn/iM8rs8U3KgjSEfk+xgCl8/g6cxl/HULMNDLUgabnPR4ppgb7DhiUogL28NF4Ok5fK1tm05SAO6lapfzK3FqqNpWR6QyIHsNSYAfe4n0708O+DCsl+zNie5YGmhI922Mp2OaRGZ5xERE/vrZsJ2hWPCnSTZrDpkFTtqrWVm3h3xyn16P8KVzrZK9D87XuzRG5oKglcsKW+ZCYAOTWl6FqsYIVEf/66knuZg1QFtLjEH9/C5m9hS/HXu+yI+B/AV55z0fK9/vEPJhPn4wZaT2b2wqHmj26Op2OA/CKRdKdUDZ1srSdjcMnAQbAaOqJS3MY3m5W5GvCf1+/UwF85wqZu62mq1Syw4= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi Alejandro, kernel test robot noticed the following build warnings: [auto build test WARNING on akpm-mm/mm-everything] [also build test WARNING on kees/for-next/pstore kees/for-next/kspp linus/master linux/master v6.18-rc5 next-20251111] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Alejandro-Colomar/array_size-h-Add-ARRAY_END/20251110-075203 base: https://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm.git mm-everything patch link: https://lore.kernel.org/r/87445e701574058b142e036c3b8a0f505086ab64.1758806023.git.alx%40kernel.org patch subject: [PATCH v1 2/3] mm: Fix benign off-by-one bugs config: arm64-randconfig-002-20251111 (https://download.01.org/0day-ci/archive/20251111/202511111838.DEnuGlic-lkp@intel.com/config) compiler: aarch64-linux-gcc (GCC) 11.5.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20251111/202511111838.DEnuGlic-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202511111838.DEnuGlic-lkp@intel.com/ All warnings (new ones prefixed by >>): mm/kfence/kfence_test.c: In function 'report_matches': mm/kfence/kfence_test.c:113:15: error: implicit declaration of function 'ENDOF' [-Werror=implicit-function-declaration] 113 | end = ENDOF(expect[0]); | ^~~~~ >> mm/kfence/kfence_test.c:113:13: warning: assignment to 'const char *' from 'int' makes pointer from integer without a cast [-Wint-conversion] 113 | end = ENDOF(expect[0]); | ^ mm/kfence/kfence_test.c:143:13: warning: assignment to 'const char *' from 'int' makes pointer from integer without a cast [-Wint-conversion] 143 | end = ENDOF(expect[1]); | ^ cc1: some warnings being treated as errors vim +113 mm/kfence/kfence_test.c 94 95 /* Check observed report matches information in @r. */ 96 static bool report_matches(const struct expect_report *r) 97 { 98 unsigned long addr = (unsigned long)r->addr; 99 bool ret = false; 100 unsigned long flags; 101 typeof(observed.lines) expect; 102 const char *end; 103 char *cur; 104 105 /* Doubled-checked locking. */ 106 if (!report_available()) 107 return false; 108 109 /* Generate expected report contents. */ 110 111 /* Title */ 112 cur = expect[0]; > 113 end = ENDOF(expect[0]); 114 switch (r->type) { 115 case KFENCE_ERROR_OOB: 116 cur += scnprintf(cur, end - cur, "BUG: KFENCE: out-of-bounds %s", 117 get_access_type(r)); 118 break; 119 case KFENCE_ERROR_UAF: 120 cur += scnprintf(cur, end - cur, "BUG: KFENCE: use-after-free %s", 121 get_access_type(r)); 122 break; 123 case KFENCE_ERROR_CORRUPTION: 124 cur += scnprintf(cur, end - cur, "BUG: KFENCE: memory corruption"); 125 break; 126 case KFENCE_ERROR_INVALID: 127 cur += scnprintf(cur, end - cur, "BUG: KFENCE: invalid %s", 128 get_access_type(r)); 129 break; 130 case KFENCE_ERROR_INVALID_FREE: 131 cur += scnprintf(cur, end - cur, "BUG: KFENCE: invalid free"); 132 break; 133 } 134 135 scnprintf(cur, end - cur, " in %pS", r->fn); 136 /* The exact offset won't match, remove it; also strip module name. */ 137 cur = strchr(expect[0], '+'); 138 if (cur) 139 *cur = '\0'; 140 141 /* Access information */ 142 cur = expect[1]; 143 end = ENDOF(expect[1]); 144 145 switch (r->type) { 146 case KFENCE_ERROR_OOB: 147 cur += scnprintf(cur, end - cur, "Out-of-bounds %s at", get_access_type(r)); 148 addr = arch_kfence_test_address(addr); 149 break; 150 case KFENCE_ERROR_UAF: 151 cur += scnprintf(cur, end - cur, "Use-after-free %s at", get_access_type(r)); 152 addr = arch_kfence_test_address(addr); 153 break; 154 case KFENCE_ERROR_CORRUPTION: 155 cur += scnprintf(cur, end - cur, "Corrupted memory at"); 156 break; 157 case KFENCE_ERROR_INVALID: 158 cur += scnprintf(cur, end - cur, "Invalid %s at", get_access_type(r)); 159 addr = arch_kfence_test_address(addr); 160 break; 161 case KFENCE_ERROR_INVALID_FREE: 162 cur += scnprintf(cur, end - cur, "Invalid free of"); 163 break; 164 } 165 166 cur += scnprintf(cur, end - cur, " 0x%p", (void *)addr); 167 168 spin_lock_irqsave(&observed.lock, flags); 169 if (!report_available()) 170 goto out; /* A new report is being captured. */ 171 172 /* Finally match expected output to what we actually observed. */ 173 ret = strstr(observed.lines[0], expect[0]) && strstr(observed.lines[1], expect[1]); 174 out: 175 spin_unlock_irqrestore(&observed.lock, flags); 176 return ret; 177 } 178 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki