From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id AC17BC07CB1 for ; Mon, 27 Nov 2023 00:26:38 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id DA5536B02E1; Sun, 26 Nov 2023 19:26:37 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id D55836B02E4; Sun, 26 Nov 2023 19:26:37 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id C44596B02E9; Sun, 26 Nov 2023 19:26:37 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id B5AFB6B02E1 for ; Sun, 26 Nov 2023 19:26:37 -0500 (EST) Received: from smtpin07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 79302401C4 for ; Mon, 27 Nov 2023 00:26:37 +0000 (UTC) X-FDA: 81501843234.07.4B776DC Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.93]) by imf09.hostedemail.com (Postfix) with ESMTP id 7FB8914000B for ; Mon, 27 Nov 2023 00:26:34 +0000 (UTC) Authentication-Results: imf09.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=ilE08U39; spf=pass (imf09.hostedemail.com: domain of lkp@intel.com designates 192.55.52.93 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1701044795; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=QAV0/lv/kUlPgDdXzx5pyltSB2u4bZdjnjoQ4tK5vlE=; b=ecw2MLVQk7A0IqLMqZdSTZJALrKi+qHcSVaC46Htyrwy1cI+efll+a8fIFyz5JAwVNidqw gRdYNF0KRr/IMxD+JWMRX5yOEm8/rBCDvcPmy7bpUeBn/KDZMF96cP/fZPldRgqRgIVSvQ ZLpG/DvcE7nMCcknks2ocNndFGoAlrQ= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1701044795; a=rsa-sha256; cv=none; b=BlJJZNPhaojhMkFdYEAEByGdhqgiE5rU6i3Oev2vVtc2uOC5tF2ZVw7RzTjkKPhqslho9C TM6Gpf14DQuBIf2ZzMkqgnnuX6jFgkm8fidVNiH0zreryQo5b4QDroY9Lkm4gEYOqFJx1i 26dVc4sg/qdU+Ey6RLOnwk7eQsnI5Dw= ARC-Authentication-Results: i=1; imf09.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=ilE08U39; spf=pass (imf09.hostedemail.com: domain of lkp@intel.com designates 192.55.52.93 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1701044794; x=1732580794; h=date:from:to:cc:subject:message-id:mime-version; bh=QnRtzoIrZsRXulbETwnxRfPI/Aq9Z5qUVIiHRcrOzE0=; b=ilE08U39TPde5HJa4g6bP9Y7FEPQmUxfQJnSQgU7wvokqWCFSjPp/xYu NBrUKsJ7fIjO6MAdcKFSdfSx+bGbgCXqUaMCtVIbwZGA2gcAFx2ki7xtK X1cItUjtoX6V3eQw1sev9w65TF8qIEdEBYMRbEnYOWEc6mI5bChFiLFCA YR6JrQD7JaCgDrOV30IokgWelmT0vWV6AJSg2mIPQB9CU5IeL13gopeez mZ6DJFZDa1Gsj2mgtPnecnP/QB7zIW6flCGTN8Zbrza7IEELW1wtUpJRE 98EvZ9hUhj0bJGs7f6N1RALfU8Oxf+a7uZ+U3JYzTabhCyyfBedgfxZr6 g==; X-IronPort-AV: E=McAfee;i="6600,9927,10906"; a="389763182" X-IronPort-AV: E=Sophos;i="6.04,229,1695711600"; d="scan'208";a="389763182" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Nov 2023 16:26:32 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10906"; a="891568232" X-IronPort-AV: E=Sophos;i="6.04,229,1695711600"; d="scan'208";a="891568232" Received: from lkp-server01.sh.intel.com (HELO d584ee6ebdcc) ([10.239.97.150]) by orsmga004.jf.intel.com with ESMTP; 26 Nov 2023 16:26:30 -0800 Received: from kbuild by d584ee6ebdcc with local (Exim 4.96) (envelope-from ) id 1r7PSF-0005f6-2p; Mon, 27 Nov 2023 00:26:27 +0000 Date: Mon, 27 Nov 2023 08:25:28 +0800 From: kernel test robot To: Haibo Li Cc: oe-kbuild-all@lists.linux.dev, linux-kernel@vger.kernel.org, Andrew Morton , Linux Memory Management List , Andrey Konovalov Subject: mm/kasan/report.c:637 kasan_non_canonical_hook() warn: unsigned 'addr' is never less than zero. Message-ID: <202311270743.3oTCwYPd-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspamd-Queue-Id: 7FB8914000B X-Rspam-User: X-Stat-Signature: t71e1nax3bnj9znn5iqfa5ibnge7t88k X-Rspamd-Server: rspam03 X-HE-Tag: 1701044794-398144 X-HE-Meta: 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 THe52b1b qnj3LNQzik5CYWOX7evNN28b5CE7YIv8TeFCjRPfzcusj+UVTS+nWqDY9Nb/GNnCpvnbVSg14s9lAvsvlbosT7bfLEZxDQVrRLPPU4ph7dmiAbdmtQaewYW6raXIRGu3SezJzXu8wnR4SywUhk0wbVeSxuc7FQaHexMAFlVBcjuzgTarQxiY1/RnxJ6IvI1JyzXppjhyjd4QNItzoyOfk1j86UjLoeAqg6l1UfmbfY93fx44GvPYy1aR1opLyhLjj9mwY8pQyJ/zqrnxYpgzbPjGn1GOs9Fwqaj5zE78sQ+ieePPR4q0A7bzBK2T7aT0YpMPZJul+7ARWpuE8PFKdB8nOunaS5r6lq5P3UiBM/MYzWAgllVW1s3nrRA== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master head: d2da77f431ac49b5763b88751a75f70daa46296c commit: babddbfb7d7d70ae7f10fedd75a45d8ad75fdddf kasan: print the original fault addr when access invalid shadow date: 6 weeks ago config: loongarch-randconfig-r071-20231126 (https://download.01.org/0day-ci/archive/20231127/202311270743.3oTCwYPd-lkp@intel.com/config) compiler: loongarch64-linux-gcc (GCC) 13.2.0 reproduce: (https://download.01.org/0day-ci/archive/20231127/202311270743.3oTCwYPd-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202311270743.3oTCwYPd-lkp@intel.com/ smatch warnings: mm/kasan/report.c:637 kasan_non_canonical_hook() warn: unsigned 'addr' is never less than zero. vim +/addr +637 mm/kasan/report.c bb2f967ce2130b Andrey Konovalov 2022-03-24 623 2f004eea0fc8f8 Jann Horn 2019-12-19 624 /* babddbfb7d7d70 Haibo Li 2023-10-09 625 * With CONFIG_KASAN, accesses to bogus pointers (outside the high 2f004eea0fc8f8 Jann Horn 2019-12-19 626 * canonical half of the address space) cause out-of-bounds shadow memory reads 2f004eea0fc8f8 Jann Horn 2019-12-19 627 * before the actual access. For addresses in the low canonical half of the 2f004eea0fc8f8 Jann Horn 2019-12-19 628 * address space, as well as most non-canonical addresses, that out-of-bounds 2f004eea0fc8f8 Jann Horn 2019-12-19 629 * shadow memory access lands in the non-canonical part of the address space. 2f004eea0fc8f8 Jann Horn 2019-12-19 630 * Help the user figure out what the original bogus pointer was. 2f004eea0fc8f8 Jann Horn 2019-12-19 631 */ 2f004eea0fc8f8 Jann Horn 2019-12-19 632 void kasan_non_canonical_hook(unsigned long addr) 2f004eea0fc8f8 Jann Horn 2019-12-19 633 { 2f004eea0fc8f8 Jann Horn 2019-12-19 634 unsigned long orig_addr; 2f004eea0fc8f8 Jann Horn 2019-12-19 635 const char *bug_type; 2f004eea0fc8f8 Jann Horn 2019-12-19 636 2f004eea0fc8f8 Jann Horn 2019-12-19 @637 if (addr < KASAN_SHADOW_OFFSET) :::::: The code at line 637 was first introduced by commit :::::: 2f004eea0fc8f86b45dfc2007add2d4986de8d02 x86/kasan: Print original address on #GP :::::: TO: Jann Horn :::::: CC: Borislav Petkov -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki