[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Debian randconfig failure, Was Re: [XEN PATCH v2 0/7] automation: Update containers to allow HTTPS access to xenbits


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Wed, 22 Feb 2023 10:08:07 +0000
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=K92uLc8rhYz2tw4w3QIKK5F2UC5P0rVMaInszbcBO2Q=; b=UO405YkmrpTaP9lVN2/tO9qwHtKWE/VbohXeftxXLSSyoM0KhsIi6qiVRZDcrbocrL6Q5UMId6Y+fhbRhr1Bi4XUDn0NrMDXPlPgMHLs9fgUaWYlNgwuDKZTvuByF5yRFgH7Dfadnt22JdGmcGBA/l5F6Vo3OzcjLkQmKgDyUMp4viI4e6JHA4RlxfO6PtDyp/1AFhPnQuNCZPRLCCQ+yR5QojoIfeqWWKQmWwSB+bchXnZZx6ndXMLcIi+g9UymcjddEPsqyQ3bxPv/hdqxQrMKfI+UsMZE/Rcyqx1BdIsIVc+cFI+oeOgeIO68Xxta5W7QPBXGGBBprWtP2usykQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZqD+AAhMeAhxJVeeuIj/hrNIJIMsdR4Nzc6aVQHW2GU+emSi0tzD4lWO95L8ae7Evhv/mgE+2iz2WUgPF8CBuIZN0txm2glKkS0vNquZ7cqhva20jsKTA+RDm92Jiv3o/gxebXk+srtkp7imfkRp4mQpj48JZ0flGyDvwiMDI0c7bh2ZXAkxiWnPETCttBN2MCvizFekrmUX4clHrTr0LdvAbMXBfQyaXihqp/kJFyvtGAxUkRnTCaZFHL/5B+GLLwAAifDRpXXn+pv/jFjwyi7hll7hn+tUdwAb1xADMNCY2oT/yPn0et2f3VcgMabzCbafwYrVCcFNm7NqFOMYAw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: Anthony PERARD <anthony.perard@xxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Wed, 22 Feb 2023 10:08:34 +0000
  • Ironport-data: A9a23:uC7nxakvWLE/PVh0c9/Sdlno5gyYJ0RdPkR7XQ2eYbSJt1+Wr1Gzt xIaWT3Saf+NMzHyfYx+OY6x8EoOsZDWzdVgTFM5qntjEyMWpZLJC+rCIxarNUt+DCFhoGFPt JxCN4aafKjYaleG+39B55C49SEUOZmgH+a6U6icfHgqH2eIcQ954Tp7gek1n4V0ttawBgKJq LvartbWfVSowFaYCEpNg064gE4p7auaVA8w5ARkPqgR5gWGzhH5MbpETU2PByqgKmVrNrbSq 9brlNmR4m7f9hExPdKp+p6TnpoiG+O60aCm0xK6aoD66vRwjnVaPpUTbZLwXXx/mTSR9+2d/ f0W3XCGpaXFCYWX8AgVe0Ew/yiTpsSq8pefSZS0mZT7I0Er7xIAahihZa07FdRwxwp5PY1B3 f0zOA0qMhyTvsGR8qyGYck22OJkNvC+aevzulk4pd3YJdAPZMmZBonvu5pf1jp2gd1SF/HDY cZfcSBocBnLfxxIPBEQFY46m+CrwHL4dlW0qnrM/fZxvzeVkV03iee0WDbWUoXiqcF9t0CUv G/ZuU/+BQkXLoe3wjuZ6HO8wOTImEsXXapLTOXkqKYz3AP7Kmo7KBcub1z8+PSAtA2dZPRcB UUI1iMFsv1nnKCsZpynN/Gim1aGtBMBX9tbE8Uh9RqAjKHT5m6xFmUCCzJMdtEinMs3XiAxk E+EmcvzAj5iu6HTTmiSnop4thu3MCkRaGMHOykNSFJf58G5+d5qyBXSUtxkDai5yMXvHi39y CyLqy54gKgPickM1OOw+lWvby+Qm6UlhzUdvm3/Nl9JJCslDGJ5T+REMWTm0Ms=
  • Ironport-hdrordr: A9a23:K7SvaqBf+90vvMnlHelW55DYdb4zR+YMi2TDt3oddfWaSKylfq GV7ZAmPHrP4gr5N0tOpTntAse9qBDnhPtICOsqTNSftWDd0QPFEGgL1+DfKlbbak/DH4BmtJ uJc8JFeaDN5VoRt7eH3OFveexQv+Vu88qT9JnjJ28Gd3AMV0n5hT0JcTpyFCdNNW97LKt8Lr WwzOxdqQGtfHwGB/7LfEXsD4D41qT2fIuNW29/OyIa
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 22/02/2023 9:53 am, Jan Beulich wrote:
> On 22.02.2023 10:42, Jan Beulich wrote:
>> On 21.02.2023 19:05, Andrew Cooper wrote:
>>> On 21/02/2023 4:55 pm, Anthony PERARD wrote:
>>>> Building randconfig on debian unstable seems to be an issue.
>>> You're talking about
>>> https://gitlab.com/xen-project/people/anthonyper/xen/-/jobs/3769926509 ?
>>>
>>> + gcc --version
>>> gcc (Debian 12.2.0-14) 12.2.0
>>>
>>> arch/x86/extable.c: In function 'search_pre_exception_table':
>>> arch/x86/extable.c:200:27: error: array subscript -1 is outside array
>>> bounds of 'struct exception_table_entry[1152921504606846975]'
>>> [-Werror=array-bounds]
>>>   200 |     unsigned long fixup = search_one_extable(
>>>       |                           ^~~~~~~~~~~~~~~~~~~
>>>   201 |         __start___pre_ex_table, __stop___pre_ex_table-1, addr);
>>>       |         ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>>> In file included from arch/x86/extable.c:8:
>>> ./arch/x86/include/asm/uaccess.h:414:37: note: at offset -8 into object
>>> '__stop___pre_ex_table' of size [0, 9223372036854775807]
>>>   414 | extern struct exception_table_entry __stop___pre_ex_table[];
>>>       |                                     ^~~~~~~~~~~~~~~~~~~~~
>>> cc1: all warnings being treated as errors
>>> make[3]: *** [Rules.mk:246: arch/x86/extable.o] Error 1
>>>
>>> Jan: do we need some more gcc-wrap sprinkled around?
>> I think we can get away without, but first of all I'm curious why gcc12
>> spots an issue there, but not in my (and perhaps also your) local builds.
>> Being a randconfig failure, is this tied to a specific setting in .config?
>> Off the top of my head I can't think of any which might affect this code.
> Looks to be the combination of DEBUG=n and COVERAGE=y.
>
>> To work around this, instead of adding gcc-wrap-ery, I'd favor simply
>> changing search_one_extable()'s 2nd parameter's meaning from "last" to
>> "end" (i.e. the range passed in from [,] to [,) in mathematical spelling).
> I'll make a patch along these lines then, I guess. Should I credit Anthony,
> you, or both of you as the reporter?

Yeah, I did wonder about changing the final parameter after sending this
email.  It stands a reasonable change of simplifying
search_one_extable() anyway.

Probably Anthony.  All I did was look through some logs.

~Andrew



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.