All of lore.kernel.org
 help / color / mirror / Atom feed
From: Jan Beulich <jbeulich@suse.com>
To: Andrew Cooper <andrew.cooper3@citrix.com>
Cc: Anthony PERARD <anthony.perard@citrix.com>,
	xen-devel@lists.xenproject.org
Subject: Re: Debian randconfig failure, Was Re: [XEN PATCH v2 0/7] automation: Update containers to allow HTTPS access to xenbits
Date: Wed, 22 Feb 2023 10:53:05 +0100	[thread overview]
Message-ID: <e2e4b7ad-bb41-4954-15a5-c62730c5def3@suse.com> (raw)
In-Reply-To: <621319f4-0924-9b5f-9f84-be275f878cb4@suse.com>

On 22.02.2023 10:42, Jan Beulich wrote:
> On 21.02.2023 19:05, Andrew Cooper wrote:
>> On 21/02/2023 4:55 pm, Anthony PERARD wrote:
>>> Building randconfig on debian unstable seems to be an issue.
>>
>> You're talking about
>> https://gitlab.com/xen-project/people/anthonyper/xen/-/jobs/3769926509 ?
>>
>> + gcc --version
>> gcc (Debian 12.2.0-14) 12.2.0
>>
>> arch/x86/extable.c: In function 'search_pre_exception_table':
>> arch/x86/extable.c:200:27: error: array subscript -1 is outside array
>> bounds of 'struct exception_table_entry[1152921504606846975]'
>> [-Werror=array-bounds]
>>   200 |     unsigned long fixup = search_one_extable(
>>       |                           ^~~~~~~~~~~~~~~~~~~
>>   201 |         __start___pre_ex_table, __stop___pre_ex_table-1, addr);
>>       |         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>> In file included from arch/x86/extable.c:8:
>> ./arch/x86/include/asm/uaccess.h:414:37: note: at offset -8 into object
>> '__stop___pre_ex_table' of size [0, 9223372036854775807]
>>   414 | extern struct exception_table_entry __stop___pre_ex_table[];
>>       |                                     ^~~~~~~~~~~~~~~~~~~~~
>> cc1: all warnings being treated as errors
>> make[3]: *** [Rules.mk:246: arch/x86/extable.o] Error 1
>>
>> Jan: do we need some more gcc-wrap sprinkled around?
> 
> I think we can get away without, but first of all I'm curious why gcc12
> spots an issue there, but not in my (and perhaps also your) local builds.
> Being a randconfig failure, is this tied to a specific setting in .config?
> Off the top of my head I can't think of any which might affect this code.

Looks to be the combination of DEBUG=n and COVERAGE=y.

> To work around this, instead of adding gcc-wrap-ery, I'd favor simply
> changing search_one_extable()'s 2nd parameter's meaning from "last" to
> "end" (i.e. the range passed in from [,] to [,) in mathematical spelling).

I'll make a patch along these lines then, I guess. Should I credit Anthony,
you, or both of you as the reporter?

Jan


  reply	other threads:[~2023-02-22  9:53 UTC|newest]

Thread overview: 18+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-02-21 16:55 [XEN PATCH v2 0/7] automation: Update containers to allow HTTPS access to xenbits Anthony PERARD
2023-02-21 16:55 ` [XEN PATCH v2 1/7] automation: Remove CentOS 7.2 containers and builds Anthony PERARD
2023-02-21 17:49   ` Andrew Cooper
2023-02-21 16:55 ` [XEN PATCH v2 2/7] automation: Ensure that all packages are up-to-dates in CentOS 7 container Anthony PERARD
2023-02-21 17:50   ` Andrew Cooper
2023-02-21 16:55 ` [XEN PATCH v2 3/7] automation: Remove clang-8 from Debian unstable container Anthony PERARD
2023-02-21 17:43   ` Andrew Cooper
2023-02-21 16:55 ` [XEN PATCH v2 4/7] automation: Use EOL tag for Jessie container Anthony PERARD
2023-02-21 16:55 ` [XEN PATCH v2 5/7] automation: Add more aliases in containerize Anthony PERARD
2023-02-21 16:55 ` [XEN PATCH v2 6/7] automation: Remove testing on Debian Jessie Anthony PERARD
2023-02-21 17:59   ` Andrew Cooper
2023-02-21 18:01     ` Andrew Cooper
2023-02-24 15:57       ` Anthony PERARD
2023-02-21 16:55 ` [XEN PATCH v2 7/7] automation: Remove expired root certificates used to be used by let's encrypt Anthony PERARD
2023-02-21 18:05 ` Debian randconfig failure, Was Re: [XEN PATCH v2 0/7] automation: Update containers to allow HTTPS access to xenbits Andrew Cooper
2023-02-22  9:42   ` Jan Beulich
2023-02-22  9:53     ` Jan Beulich [this message]
2023-02-22 10:08       ` Andrew Cooper

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=e2e4b7ad-bb41-4954-15a5-c62730c5def3@suse.com \
    --to=jbeulich@suse.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=anthony.perard@citrix.com \
    --cc=xen-devel@lists.xenproject.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.