From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 74D52C433EF for ; Wed, 4 May 2022 18:45:43 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id DE3786B0071; Wed, 4 May 2022 14:45:42 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id D91F86B0073; Wed, 4 May 2022 14:45:42 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id C59216B0074; Wed, 4 May 2022 14:45:42 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id B2D0E6B0071 for ; Wed, 4 May 2022 14:45:42 -0400 (EDT) Received: from smtpin07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay09.hostedemail.com (Postfix) with ESMTP id 7CF1C29943 for ; Wed, 4 May 2022 18:45:42 +0000 (UTC) X-FDA: 79428939324.07.7A8C29C Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf09.hostedemail.com (Postfix) with ESMTP id 1DBEA14007D for ; Wed, 4 May 2022 18:45:35 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 26BD261B27; Wed, 4 May 2022 18:45:41 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id BD338C385AE; Wed, 4 May 2022 18:45:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1651689940; bh=neqWJaNNLruFhLtSzdV4d34b2LqsaISq6IIrNL+8k3k=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AQQ6pZGbDLYpdM++Rf71SDU2F9ffIOyzhltFZGnaHtHn6t+/IwkrkuwLLICOa36tT 491tMoF32XeDQGf7/+v3aSgydhc9Nhhv/SA2bBa8POihmVrHt39ecRR4PWZM74RZqr 9+tz/yB16nTSHsMWAlolcomkiHZrzQXqopKKxtDTlsAMFA6C1C1pOyYaPzCP03DOwb zT0euTcOk76xivPnQoku2NolGBi8vhW6BpNagm0e2Se9RC3tj1j2ss0ZP2ZTXQib2n 3EaiDhId0AqGqWVRbmvVZLfsA5Ru7si569Hfz+N7/9lLQa04+gqdYeRlor4EatZ4SF PCoNpcDraH14Q== From: SeongJae Park To: Yuanchu Xie Cc: Shuah Khan , Markus Boehme , SeongJae Park , rientjes@google.com, Andrew Morton , linux-mm@kvack.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v3] selftests/damon: suppress compiler warnings for huge_count_read_write Date: Wed, 4 May 2022 18:45:37 +0000 Message-Id: <20220504184537.130085-1-sj@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220504182908.1322874-1-yuanchu@google.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Stat-Signature: 8k3mwe51a81kpmrkg8m1w5fukxftgoj7 X-Rspamd-Server: rspam12 X-Rspamd-Queue-Id: 1DBEA14007D Authentication-Results: imf09.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=AQQ6pZGb; spf=pass (imf09.hostedemail.com: domain of sj@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=sj@kernel.org; dmarc=pass (policy=none) header.from=kernel.org X-Rspam-User: X-HE-Tag: 1651689935-408482 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Hi Yuanchu, On Wed, 4 May 2022 18:29:08 +0000 Yuanchu Xie wrote: > The test case added in commit db7a347b26fe ("mm/damon/dbgfs: > use '__GFP_NOWARN' for user-specified size buffer allocation") > intentionally writes and reads with a large count to cause > allocation failure and check for kernel warnings. We suppress > the compiler warnings for these calls as they work as intended. > > Signed-off-by: Yuanchu Xie > --- It would be a good practice to mention the changes from the previous version of this patch here[1]. [1] https://docs.kernel.org/process/submitting-patches.html#the-canonical-patch-format > tools/testing/selftests/damon/huge_count_read_write.c | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/tools/testing/selftests/damon/huge_count_read_write.c b/tools/testing/selftests/damon/huge_count_read_write.c > index ad7a6b4cf338..91bd80c75cd9 100644 > --- a/tools/testing/selftests/damon/huge_count_read_write.c > +++ b/tools/testing/selftests/damon/huge_count_read_write.c > @@ -2,6 +2,8 @@ > /* > * Author: SeongJae Park > */ > +#pragma GCC diagnostic ignored "-Wstringop-overflow" > +#pragma GCC diagnostic ignored "-Wstringop-overread" I agree that this must be the cleaner way than v2. But, I get below warning after applying this: $ sudo make -C tools/testing/selftests/damon run_tests make: Entering directory '/home/sjpark/linux/tools/testing/selftests/damon' gcc huge_count_read_write.c -o /home/sjpark/linux/tools/testing/selftests/damon/huge_count_read_write huge_count_read_write.c:6:32: warning: unknown option after ‘#pragma GCC diagnostic’ kind [-Wpragmas] 6 | #pragma GCC diagnostic ignored "-Wstringop-overread" | ^~~~~~~~~~~~~~~~~~~~~ My gcc version is: $ gcc --version gcc (Ubuntu 9.4.0-1ubuntu1~20.04.1) 9.4.0 Thanks, SJ > > #include > #include > -- > 2.36.0.464.gb9c8b46e94-goog >