Hmm you're sending this separete from the other MAP_FAILED checks, and not referencing that in any way? (original patch at [0]).
Please just send this as a 2 patch series _with a cover letter_ and both patches in-reply-to the cover letter. Also make sure to propagate tags correctly. [0]:https://lore.kernel.org/all/[email protected]/ On Mon, May 18, 2026 at 04:21:20PM +0800, Hongfu Li wrote: > Several mmap() calls lack error checks and would crash on failure. > Add the missing checks. Also replace bare (void *)-1 with the Well you're assert()'ing so you're causing a crash on failure anyway? I'd just say that you are adding missing checks against the mmap() return value, as well as improving readability and consistency by replacing (void *)-1 with MAP_FAILED in instances where that was used rather than MAP_FAILED. > standard MAP_FAILED macro in protection_keys.c for consistency. > > Signed-off-by: Hongfu Li <[email protected]> Some comments below. > --- > tools/testing/selftests/mm/pkey_sighandler_tests.c | 2 ++ > tools/testing/selftests/mm/protection_keys.c | 9 +++++---- > 2 files changed, 7 insertions(+), 4 deletions(-) > > diff --git a/tools/testing/selftests/mm/pkey_sighandler_tests.c > b/tools/testing/selftests/mm/pkey_sighandler_tests.c > index 302fef54049c..4637809192f9 100644 > --- a/tools/testing/selftests/mm/pkey_sighandler_tests.c > +++ b/tools/testing/selftests/mm/pkey_sighandler_tests.c > @@ -317,6 +317,7 @@ static void > test_sigsegv_handler_with_different_pkey_for_stack(void) > /* Set up alternate signal stack that will use the default MPK */ > sigstack.ss_sp = mmap(0, STACK_SIZE, PROT_READ | PROT_WRITE, > MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); > + assert(sigstack.ss_sp != MAP_FAILED); Why not pkey_assert()? > sigstack.ss_flags = 0; > sigstack.ss_size = STACK_SIZE; > > @@ -490,6 +491,7 @@ static void test_pkru_sigreturn(void) > /* Set up alternate signal stack that will use the default MPK */ > sigstack.ss_sp = mmap(0, STACK_SIZE, PROT_READ | PROT_WRITE, > MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); > + assert(sigstack.ss_sp != MAP_FAILED); Why not pkey_assert()? > sigstack.ss_flags = 0; > sigstack.ss_size = STACK_SIZE; > > diff --git a/tools/testing/selftests/mm/protection_keys.c > b/tools/testing/selftests/mm/protection_keys.c > index 2085982dba69..d53bdc540a74 100644 > --- a/tools/testing/selftests/mm/protection_keys.c > +++ b/tools/testing/selftests/mm/protection_keys.c > @@ -667,7 +667,7 @@ static void *malloc_pkey_with_mprotect(long size, int > prot, u16 pkey) > size, prot, pkey); > pkey_assert(pkey < NR_PKEYS); > ptr = mmap(NULL, size, prot, MAP_ANONYMOUS|MAP_PRIVATE, -1, 0); > - pkey_assert(ptr != (void *)-1); > + pkey_assert(ptr != MAP_FAILED); > ret = mprotect_pkey((void *)ptr, PAGE_SIZE, prot, pkey); > pkey_assert(!ret); > record_pkey_malloc(ptr, size, prot); > @@ -690,7 +690,7 @@ static void *malloc_pkey_anon_huge(long size, int prot, > u16 pkey) > */ > size = ALIGN_UP(size, HPAGE_SIZE * 2); > ptr = mmap(NULL, size, PROT_NONE, MAP_ANONYMOUS|MAP_PRIVATE, -1, 0); > - pkey_assert(ptr != (void *)-1); > + pkey_assert(ptr != MAP_FAILED); > record_pkey_malloc(ptr, size, prot); > mprotect_pkey(ptr, size, prot, pkey); > > @@ -770,7 +770,7 @@ static void *malloc_pkey_hugetlb(long size, int prot, u16 > pkey) > size = ALIGN_UP(size, HPAGE_SIZE * 2); > pkey_assert(pkey < NR_PKEYS); > ptr = mmap(NULL, size, PROT_NONE, flags, -1, 0); > - pkey_assert(ptr != (void *)-1); > + pkey_assert(ptr != MAP_FAILED); > mprotect_pkey(ptr, size, prot, pkey); > > record_pkey_malloc(ptr, size, prot); > @@ -1217,6 +1217,7 @@ static void arch_force_pkey_reg_init(void) > * doing the XSAVE size enumeration dance. > */ > buf = mmap(NULL, 1*MB, PROT_READ|PROT_WRITE, MAP_ANONYMOUS|MAP_PRIVATE, > -1, 0); > + pkey_assert(buf != MAP_FAILED); > > /* These __builtins require compiling with -mxsave */ > > @@ -1775,7 +1776,7 @@ int main(void) > printf("running PKEY tests for unsupported CPU/OS\n"); > > ptr = mmap(NULL, size, PROT_NONE, MAP_ANONYMOUS|MAP_PRIVATE, > -1, 0); > - assert(ptr != (void *)-1); > + assert(ptr != MAP_FAILED); Probably best to convert to pkey_assert() at the same time? > test_mprotect_pkey_on_unsupported_cpu(ptr, 1); > exit(0); > } > -- > 2.25.1 > Cheers, Lorenzo

