Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6AA1FC433F5 for ; Thu, 6 Jan 2022 09:50:14 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237577AbiAFJuN (ORCPT ); Thu, 6 Jan 2022 04:50:13 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50744 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237565AbiAFJuM (ORCPT ); Thu, 6 Jan 2022 04:50:12 -0500 Received: from mail-yb1-xb35.google.com (mail-yb1-xb35.google.com [IPv6:2607:f8b0:4864:20::b35]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0D44CC061245 for ; Thu, 6 Jan 2022 01:50:12 -0800 (PST) Received: by mail-yb1-xb35.google.com with SMTP id m19so5783946ybf.9 for ; Thu, 06 Jan 2022 01:50:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=K8lARk+9aIceWETxoJnQyDEyoZX3xAzp3WCfINwI6nM=; b=k9xVZQ7F0zo07Vy5vxEiX15gDzQ/J8WPpVLEcmZcOxvEOEsxI+uA1tbFmD+ryerBQ0 URYkWpkO5NPe8ZSXPNUkrBq/p2p0rJSi0Ov36BZOIU8dEawNxkcz9sYrOqcA2OLqVQfa Pmc9+UZcwCm4VWtjOUkjlrUYb3HwrsKVH5hr9yfBKjSQUY9mAJ3VGuCg/quT70qVEent fDsWG7UQJw/f31HDqod4tRJZQqgIA93DaBgNfs3+dq6O96ASSnc7BeE9lpmq5feoZQP1 bOHqkfgUamss86JkpTaTdp6Gezl2oT5a650xuUO9ugsdZ7k4iT8laMAXOnWCYbweLk9a UlSw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=K8lARk+9aIceWETxoJnQyDEyoZX3xAzp3WCfINwI6nM=; b=a3OnRSeYnhtyjeQYFCyhkdip0PnTQDDQLj8BHvFcfuDJw5/n1VYU4E/koCfrYHi+SM hPqpDquGB59VIvzYbZT5f0aTOPYQB75QakjE51GXUscZBjAZzZWBvbDpEWxRZjcismQL OmyE5lufxbfN86d3tFnAG5p/ju7vS6BbgYGUi2cCh0xENDs6p8oY/FMUC7Hsc163tGo5 1d7pUbdQIIII6DiXzRhx67TyBXDZC2Z2FayMIY33bK6WG7CMS9hQyvmKdoo67zADTrwZ kclWxbch4TW9NAo3DtVurbyThZY6XNbyLU/nNVtqiSFbo1HoEj1icna3rEaEjUfoywg1 ri6w== X-Gm-Message-State: AOAM531cQaZ6s4lG79CDQuHimQ21nTPEZXXaC0ac/v0rWcUyjyk8JIlc b7nO38m/kZf3YLTxgCL9f86dlJdTbhaJoTFQa3E8cA== X-Google-Smtp-Source: ABdhPJwuRNMrNbvBg4YjrN/D91Fr46dhfxItlTDQnp7sGMJmAh0rX6MJOEXcWkd8jZEKIJV+FKdae74tO2GnvWwMyBA= X-Received: by 2002:a25:73c7:: with SMTP id o190mr23381904ybc.108.1641462611076; Thu, 06 Jan 2022 01:50:11 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Naresh Kamboju Date: Thu, 6 Jan 2022 15:19:59 +0530 Message-ID: Subject: Re: test_vsyscall.c:500:22: warning: '__builtin_memcmp_eq' specified bound 4096 exceeds source size 0 To: Greg Kroah-Hartman , skhan@linuxfoundation.org Cc: linux-stable , "open list:KERNEL SELFTEST FRAMEWORK" , open list , lkft-triage@lists.linaro.org, X86 ML , Shuah Khan , Andy Lutomirski , Dave Hansen , Peter Zijlstra , Jann Horn , John Hubbard , Andrew Morton , "Kirill A. Shutemov" , Linus Torvalds , Anders Roxell Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 6 Jan 2022 at 15:02, Greg Kroah-Hartman wrote: > > On Thu, Jan 06, 2022 at 02:55:53PM +0530, Naresh Kamboju wrote: > > While building selftests the following warnings were noticed for x86_64 > > architecture on Linux stable v5.15.13 kernel. > > > > metadata: > > git repo: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linu= x.git > > git commit: 734eb1fd2073f503f5c6b44f1c0d453ca6986b84 > > git describe: v5.15.13 > > toolchain": gcc-11 > > kernel-config: https://builds.tuxbuild.com/23HFo8abXIL6i4FFfSYiJlqAYM= W/config > > > > x86_64-linux-gnu-gcc -m64 -o \ > > /home/tuxbuild/.cache/tuxmake/builds/current/kselftest/x86/test_vsyscal= l_64 \ > > -O2 -g -std=3Dgnu99 -pthread -Wall -no-pie \ > > -DCAN_BUILD_64 test_vsyscall.c helpers.h -lrt -ldl > > > > test_vsyscall.c: In function 'test_process_vm_readv': > > test_vsyscall.c:500:22: warning: '__builtin_memcmp_eq' specified bound > > 4096 exceeds source size 0 [-Wstringop-overread] > > 500 | if (!memcmp(buf, (const void > > *)0xffffffffff600000, 4096)) { > > | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~= ~~~~~~~~~ > > > > Reported-by: Linux Kernel Functional Testing > > > > Build link: > > https://builds.tuxbuild.com/23HFo8abXIL6i4FFfSYiJlqAYMW/ > > > > # To install tuxmake on your system globally: > > # sudo pip3 install -U tuxmake > > > > tuxmake --runtime podman --target-arch x86_64 --toolchain gcc-11 \ > > --kconfig https://builds.tuxbuild.com/23HFo8abXIL6i4FFfSYiJlqAYMW/conf= ig \ > > cpupower headers kernel kselftest kselftest-merge modules > > Is this a new regression from 5.15.0? Is it also present on Linus's tree= ? This build warning is not present in Linus's tree. Following patch to be backported to 5.15.x --- From dd40f44eabe1e122c6852fabb298aac05b083fce Mon Sep 17 00:00:00 2001 From: Shuah Khan Date: Thu, 21 Oct 2021 15:33:33 -0600 Subject: selftests: x86: fix [-Wstringop-overread] warn in test_process_vm_readv() Fix the following [-Wstringop-overread] by passing in the variable instead of the value. test_vsyscall.c: In function =E2=80=98test_process_vm_readv=E2=80=99: test_vsyscall.c:500:22: warning: =E2=80=98__builtin_memcmp_eq=E2=80=99 spec= ified bound 4096 exceeds source size 0 [-Wstringop-overread] 500 | if (!memcmp(buf, (const void *)0xffffffffff600000, 4096)) { | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~= ~~~~~ Signed-off-by: Shuah Khan - Naresh