* [android-common:android12-5.10-2021-09 4582/10860] lib/test_kasan_module.c:41:2: warning: Value stored to 'unused' is never read [clang-analyzer-deadcode.DeadStores]
@ 2021-12-15 23:28 kernel test robot
0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2021-12-15 23:28 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 21937 bytes --]
CC: kbuild-all(a)lists.01.org
TO: cros-kernel-buildreports(a)googlegroups.com
tree: https://android.googlesource.com/kernel/common android12-5.10-2021-09
head: ee75d385a3eaa0e0f430d77b0e610914e3764678
commit: 916518ead7a5c918acbd0bdb48e8e5dd10e62bd8 [4582/10860] FROMGIT: kasan: rename CONFIG_TEST_KASAN_MODULE
:::::: branch date: 5 days ago
:::::: commit date: 10 months ago
config: x86_64-randconfig-c007-20211214 (https://download.01.org/0day-ci/archive/20211216/202112160728.tIW3Y6j7-lkp(a)intel.com/config)
compiler: clang version 14.0.0 (https://github.com/llvm/llvm-project b6a2ddb6c8ac29412b1361810972e15221fa021c)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
git remote add android-common https://android.googlesource.com/kernel/common
git fetch --no-tags android-common android12-5.10-2021-09
git checkout 916518ead7a5c918acbd0bdb48e8e5dd10e62bd8
# save the config file to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=x86_64 clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
^
include/linux/compiler_types.h:311:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:301:2: note: expanded from macro '__compiletime_assert'
do { \
^
drivers/scsi/libsas/sas_expander.c:1851:2: note: Loop condition is true. Entering loop body
list_for_each_entry(ch, &ex->children, siblings) {
^
include/linux/list.h:628:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
drivers/scsi/libsas/sas_expander.c:1852:3: note: Taking true branch
if (dev_is_expander(ch->dev_type)) {
^
drivers/scsi/libsas/sas_expander.c:1853:10: note: Calling 'sas_find_bcast_dev'
res = sas_find_bcast_dev(ch, src_dev);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:1832:8: note: Calling 'sas_get_ex_change_count'
res = sas_get_ex_change_count(dev, &ex_change_count);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:1782:6: note: Assuming 'rg_req' is non-null
if (!rg_req)
^~~~~~~
drivers/scsi/libsas/sas_expander.c:1782:2: note: Taking false branch
if (!rg_req)
^
drivers/scsi/libsas/sas_expander.c:1785:12: note: Calling 'alloc_smp_resp'
rg_resp = alloc_smp_resp(RG_RESP_SIZE);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:163:9: note: Calling 'kzalloc'
return kzalloc(size, GFP_KERNEL);
^~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:664:9: note: Uninitialized value stored to field 'result'
return kmalloc(size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:664:2: note: Returning pointer, which participates in a condition later
return kmalloc(size, flags | __GFP_ZERO);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:163:9: note: Returning from 'kzalloc'
return kzalloc(size, GFP_KERNEL);
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:163:2: note: Returning pointer, which participates in a condition later
return kzalloc(size, GFP_KERNEL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:1785:12: note: Returning from 'alloc_smp_resp'
rg_resp = alloc_smp_resp(RG_RESP_SIZE);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:1786:6: note: Assuming 'rg_resp' is non-null
if (!rg_resp) {
^~~~~~~~
drivers/scsi/libsas/sas_expander.c:1786:2: note: Taking false branch
if (!rg_resp) {
^
drivers/scsi/libsas/sas_expander.c:1793:8: note: Calling 'smp_execute_task'
res = smp_execute_task(dev, rg_req, RG_REQ_SIZE, rg_resp,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:148:2: note: Returning without writing to 'resp->result'
return smp_execute_task_sg(dev, &req_sg, &resp_sg);
^
drivers/scsi/libsas/sas_expander.c:148:2: note: Returning value, which participates in a condition later
return smp_execute_task_sg(dev, &req_sg, &resp_sg);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:1793:8: note: Returning from 'smp_execute_task'
res = smp_execute_task(dev, rg_req, RG_REQ_SIZE, rg_resp,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/scsi/libsas/sas_expander.c:1795:6: note: Assuming 'res' is 0
if (res)
^~~
drivers/scsi/libsas/sas_expander.c:1795:2: note: Taking false branch
if (res)
^
drivers/scsi/libsas/sas_expander.c:1797:22: note: The left operand of '!=' is a garbage value
if (rg_resp->result != SMP_RESP_FUNC_ACC) {
~~~~~~~~~~~~~~~ ^
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
1 warning generated.
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
1 warning generated.
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
1 warning generated.
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
1 warning generated.
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
1 warning generated.
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
1 warning generated.
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
1 warning generated.
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
>> lib/test_kasan_module.c:41:2: warning: Value stored to 'unused' is never read [clang-analyzer-deadcode.DeadStores]
unused = copy_from_user(kmem, usermem, size + 1 + OOB_TAG_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/test_kasan_module.c:41:2: note: Value stored to 'unused' is never read
unused = copy_from_user(kmem, usermem, size + 1 + OOB_TAG_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/test_kasan_module.c:44:2: warning: Value stored to 'unused' is never read [clang-analyzer-deadcode.DeadStores]
unused = copy_to_user(usermem, kmem, size + 1 + OOB_TAG_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/test_kasan_module.c:44:2: note: Value stored to 'unused' is never read
unused = copy_to_user(usermem, kmem, size + 1 + OOB_TAG_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/test_kasan_module.c:47:2: warning: Value stored to 'unused' is never read [clang-analyzer-deadcode.DeadStores]
unused = __copy_from_user(kmem, usermem, size + 1 + OOB_TAG_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/test_kasan_module.c:47:2: note: Value stored to 'unused' is never read
unused = __copy_from_user(kmem, usermem, size + 1 + OOB_TAG_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/test_kasan_module.c:50:2: warning: Value stored to 'unused' is never read [clang-analyzer-deadcode.DeadStores]
unused = __copy_to_user(usermem, kmem, size + 1 + OOB_TAG_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/test_kasan_module.c:50:2: note: Value stored to 'unused' is never read
unused = __copy_to_user(usermem, kmem, size + 1 + OOB_TAG_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/test_kasan_module.c:53:2: warning: Value stored to 'unused' is never read [clang-analyzer-deadcode.DeadStores]
unused = __copy_from_user_inatomic(kmem, usermem, size + 1 + OOB_TAG_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/test_kasan_module.c:53:2: note: Value stored to 'unused' is never read
unused = __copy_from_user_inatomic(kmem, usermem, size + 1 + OOB_TAG_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/test_kasan_module.c:56:2: warning: Value stored to 'unused' is never read [clang-analyzer-deadcode.DeadStores]
unused = __copy_to_user_inatomic(usermem, kmem, size + 1 + OOB_TAG_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/test_kasan_module.c:56:2: note: Value stored to 'unused' is never read
unused = __copy_to_user_inatomic(usermem, kmem, size + 1 + OOB_TAG_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/test_kasan_module.c:59:2: warning: Value stored to 'unused' is never read [clang-analyzer-deadcode.DeadStores]
unused = strncpy_from_user(kmem, usermem, size + 1 + OOB_TAG_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/test_kasan_module.c:59:2: note: Value stored to 'unused' is never read
unused = strncpy_from_user(kmem, usermem, size + 1 + OOB_TAG_OFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>> lib/test_kasan_module.c:76:8: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
fp->i = 1;
~~~~~ ^
lib/test_kasan_module.c:72:30: note: Left side of '&&' is false
struct kasan_rcu_info *fp = container_of(rp,
^
include/linux/kernel.h:853:61: note: expanded from macro 'container_of'
BUILD_BUG_ON_MSG(!__same_type(*(ptr), ((type *)0)->member) && \
^
lib/test_kasan_module.c:72:30: note: Taking false branch
struct kasan_rcu_info *fp = container_of(rp,
^
include/linux/kernel.h:853:2: note: expanded from macro 'container_of'
BUILD_BUG_ON_MSG(!__same_type(*(ptr), ((type *)0)->member) && \
^
include/linux/build_bug.h:39:37: note: expanded from macro 'BUILD_BUG_ON_MSG'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
^
include/linux/compiler_types.h:323:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:311:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:303:3: note: expanded from macro '__compiletime_assert'
if (!(condition)) \
^
lib/test_kasan_module.c:72:30: note: Loop condition is false. Exiting loop
struct kasan_rcu_info *fp = container_of(rp,
^
include/linux/kernel.h:853:2: note: expanded from macro 'container_of'
BUILD_BUG_ON_MSG(!__same_type(*(ptr), ((type *)0)->member) && \
^
include/linux/build_bug.h:39:37: note: expanded from macro 'BUILD_BUG_ON_MSG'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
^
include/linux/compiler_types.h:323:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:311:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:301:2: note: expanded from macro '__compiletime_assert'
do { \
^
lib/test_kasan_module.c:75:2: note: Memory is released
kfree(fp);
^~~~~~~~~
lib/test_kasan_module.c:76:8: note: Use of memory after it is freed
fp->i = 1;
~~~~~ ^
Suppressed 2 warnings (1 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
1 warning generated.
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
4 warnings generated.
fs/gfs2/glock.c:643:3: warning: Called function pointer is null (null dereference) [clang-analyzer-core.CallAndMessage]
glops->go_inval(gl, target == LM_ST_DEFERRED ? 0 : DIO_METADATA);
^~~~~~~~~~~~~~~
fs/gfs2/glock.c:586:42: note: Assuming 'gh' is null
unsigned int lck_flags = (unsigned int)(gh ? gh->gh_flags : 0);
^~
fs/gfs2/glock.c:586:42: note: '?' condition is false
fs/gfs2/glock.c:589:6: note: Assuming 'target' is equal to LM_ST_UNLOCKED
if (target != LM_ST_UNLOCKED && glock_blocked_by_withdraw(gl) &&
^~~~~~~~~~~~~~~~~~~~~~~~
fs/gfs2/glock.c:589:31: note: Left side of '&&' is false
if (target != LM_ST_UNLOCKED && glock_blocked_by_withdraw(gl) &&
^
fs/gfs2/glock.c:594:19: note: Assuming 'target' is not equal to field 'gl_state'
GLOCK_BUG_ON(gl, gl->gl_state == target);
^
fs/gfs2/glock.h:205:46: note: expanded from macro 'GLOCK_BUG_ON'
#define GLOCK_BUG_ON(gl,x) do { if (unlikely(x)) { \
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/gfs2/glock.c:594:2: note: Taking false branch
GLOCK_BUG_ON(gl, gl->gl_state == target);
^
fs/gfs2/glock.h:205:33: note: expanded from macro 'GLOCK_BUG_ON'
#define GLOCK_BUG_ON(gl,x) do { if (unlikely(x)) { \
^
fs/gfs2/glock.c:594:2: note: Loop condition is false. Exiting loop
GLOCK_BUG_ON(gl, gl->gl_state == target);
^
fs/gfs2/glock.h:205:28: note: expanded from macro 'GLOCK_BUG_ON'
#define GLOCK_BUG_ON(gl,x) do { if (unlikely(x)) { \
^
fs/gfs2/glock.c:595:19: note: Assuming field 'gl_state' is not equal to field 'gl_target'
GLOCK_BUG_ON(gl, gl->gl_state == gl->gl_target);
^
fs/gfs2/glock.h:205:46: note: expanded from macro 'GLOCK_BUG_ON'
#define GLOCK_BUG_ON(gl,x) do { if (unlikely(x)) { \
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/gfs2/glock.c:595:2: note: Taking false branch
vim +/unused +41 lib/test_kasan_module.c
73228c7ecc5e40 Patricia Alfonso 2020-10-13 19
73228c7ecc5e40 Patricia Alfonso 2020-10-13 20 static noinline void __init copy_user_test(void)
73228c7ecc5e40 Patricia Alfonso 2020-10-13 21 {
73228c7ecc5e40 Patricia Alfonso 2020-10-13 22 char *kmem;
73228c7ecc5e40 Patricia Alfonso 2020-10-13 23 char __user *usermem;
73228c7ecc5e40 Patricia Alfonso 2020-10-13 24 size_t size = 10;
73228c7ecc5e40 Patricia Alfonso 2020-10-13 25 int unused;
73228c7ecc5e40 Patricia Alfonso 2020-10-13 26
73228c7ecc5e40 Patricia Alfonso 2020-10-13 27 kmem = kmalloc(size, GFP_KERNEL);
73228c7ecc5e40 Patricia Alfonso 2020-10-13 28 if (!kmem)
73228c7ecc5e40 Patricia Alfonso 2020-10-13 29 return;
73228c7ecc5e40 Patricia Alfonso 2020-10-13 30
73228c7ecc5e40 Patricia Alfonso 2020-10-13 31 usermem = (char __user *)vm_mmap(NULL, 0, PAGE_SIZE,
73228c7ecc5e40 Patricia Alfonso 2020-10-13 32 PROT_READ | PROT_WRITE | PROT_EXEC,
73228c7ecc5e40 Patricia Alfonso 2020-10-13 33 MAP_ANONYMOUS | MAP_PRIVATE, 0);
73228c7ecc5e40 Patricia Alfonso 2020-10-13 34 if (IS_ERR(usermem)) {
73228c7ecc5e40 Patricia Alfonso 2020-10-13 35 pr_err("Failed to allocate user memory\n");
73228c7ecc5e40 Patricia Alfonso 2020-10-13 36 kfree(kmem);
73228c7ecc5e40 Patricia Alfonso 2020-10-13 37 return;
73228c7ecc5e40 Patricia Alfonso 2020-10-13 38 }
73228c7ecc5e40 Patricia Alfonso 2020-10-13 39
73228c7ecc5e40 Patricia Alfonso 2020-10-13 40 pr_info("out-of-bounds in copy_from_user()\n");
73228c7ecc5e40 Patricia Alfonso 2020-10-13 @41 unused = copy_from_user(kmem, usermem, size + 1 + OOB_TAG_OFF);
73228c7ecc5e40 Patricia Alfonso 2020-10-13 42
73228c7ecc5e40 Patricia Alfonso 2020-10-13 43 pr_info("out-of-bounds in copy_to_user()\n");
73228c7ecc5e40 Patricia Alfonso 2020-10-13 44 unused = copy_to_user(usermem, kmem, size + 1 + OOB_TAG_OFF);
73228c7ecc5e40 Patricia Alfonso 2020-10-13 45
73228c7ecc5e40 Patricia Alfonso 2020-10-13 46 pr_info("out-of-bounds in __copy_from_user()\n");
73228c7ecc5e40 Patricia Alfonso 2020-10-13 47 unused = __copy_from_user(kmem, usermem, size + 1 + OOB_TAG_OFF);
73228c7ecc5e40 Patricia Alfonso 2020-10-13 48
73228c7ecc5e40 Patricia Alfonso 2020-10-13 49 pr_info("out-of-bounds in __copy_to_user()\n");
73228c7ecc5e40 Patricia Alfonso 2020-10-13 50 unused = __copy_to_user(usermem, kmem, size + 1 + OOB_TAG_OFF);
73228c7ecc5e40 Patricia Alfonso 2020-10-13 51
73228c7ecc5e40 Patricia Alfonso 2020-10-13 52 pr_info("out-of-bounds in __copy_from_user_inatomic()\n");
73228c7ecc5e40 Patricia Alfonso 2020-10-13 53 unused = __copy_from_user_inatomic(kmem, usermem, size + 1 + OOB_TAG_OFF);
73228c7ecc5e40 Patricia Alfonso 2020-10-13 54
73228c7ecc5e40 Patricia Alfonso 2020-10-13 55 pr_info("out-of-bounds in __copy_to_user_inatomic()\n");
73228c7ecc5e40 Patricia Alfonso 2020-10-13 56 unused = __copy_to_user_inatomic(usermem, kmem, size + 1 + OOB_TAG_OFF);
73228c7ecc5e40 Patricia Alfonso 2020-10-13 57
73228c7ecc5e40 Patricia Alfonso 2020-10-13 58 pr_info("out-of-bounds in strncpy_from_user()\n");
73228c7ecc5e40 Patricia Alfonso 2020-10-13 59 unused = strncpy_from_user(kmem, usermem, size + 1 + OOB_TAG_OFF);
73228c7ecc5e40 Patricia Alfonso 2020-10-13 60
73228c7ecc5e40 Patricia Alfonso 2020-10-13 61 vm_munmap((unsigned long)usermem, PAGE_SIZE);
73228c7ecc5e40 Patricia Alfonso 2020-10-13 62 kfree(kmem);
73228c7ecc5e40 Patricia Alfonso 2020-10-13 63 }
73228c7ecc5e40 Patricia Alfonso 2020-10-13 64
73228c7ecc5e40 Patricia Alfonso 2020-10-13 65 static struct kasan_rcu_info {
73228c7ecc5e40 Patricia Alfonso 2020-10-13 66 int i;
73228c7ecc5e40 Patricia Alfonso 2020-10-13 67 struct rcu_head rcu;
73228c7ecc5e40 Patricia Alfonso 2020-10-13 68 } *global_rcu_ptr;
73228c7ecc5e40 Patricia Alfonso 2020-10-13 69
73228c7ecc5e40 Patricia Alfonso 2020-10-13 70 static noinline void __init kasan_rcu_reclaim(struct rcu_head *rp)
73228c7ecc5e40 Patricia Alfonso 2020-10-13 71 {
73228c7ecc5e40 Patricia Alfonso 2020-10-13 72 struct kasan_rcu_info *fp = container_of(rp,
73228c7ecc5e40 Patricia Alfonso 2020-10-13 73 struct kasan_rcu_info, rcu);
73228c7ecc5e40 Patricia Alfonso 2020-10-13 74
73228c7ecc5e40 Patricia Alfonso 2020-10-13 75 kfree(fp);
73228c7ecc5e40 Patricia Alfonso 2020-10-13 @76 fp->i = 1;
73228c7ecc5e40 Patricia Alfonso 2020-10-13 77 }
73228c7ecc5e40 Patricia Alfonso 2020-10-13 78
:::::: The code at line 41 was first introduced by commit
:::::: 73228c7ecc5e40c0851c4703c5ec6ed38123e989 KASAN: port KASAN Tests to KUnit
:::::: TO: Patricia Alfonso <trishalfonso@google.com>
:::::: CC: Linus Torvalds <torvalds@linux-foundation.org>
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2021-12-15 23:28 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-12-15 23:28 [android-common:android12-5.10-2021-09 4582/10860] lib/test_kasan_module.c:41:2: warning: Value stored to 'unused' is never read [clang-analyzer-deadcode.DeadStores] kernel test robot
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.