==========
build_32bit - FAILED



WARNING: unmet direct dependencies detected for GET_FREE_REGION
  Depends on [n]: SPARSEMEM [=n]
  Selected by [m]:
  - RESOURCE_KUNIT_TEST [=m] && RUNTIME_TESTING_MENU [=y] && KUNIT [=m]

WARNING: unmet direct dependencies detected for GET_FREE_REGION
  Depends on [n]: SPARSEMEM [=n]
  Selected by [m]:
  - RESOURCE_KUNIT_TEST [=m] && RUNTIME_TESTING_MENU [=y] && KUNIT [=m]

WARNING: unmet direct dependencies detected for GET_FREE_REGION
  Depends on [n]: SPARSEMEM [=n]
  Selected by [m]:
  - RESOURCE_KUNIT_TEST [=m] && RUNTIME_TESTING_MENU [=y] && KUNIT [=m]
tools/testing/selftests/arm64/tags/.gitignore: warning: ignored by one of the .gitignore files
tools/testing/selftests/arm64/tags/Makefile: warning: ignored by one of the .gitignore files
tools/testing/selftests/arm64/tags/tags_test.c: warning: ignored by one of the .gitignore files

WARNING: unmet direct dependencies detected for GET_FREE_REGION
  Depends on [n]: SPARSEMEM [=n]
  Selected by [m]:
  - RESOURCE_KUNIT_TEST [=m] && RUNTIME_TESTING_MENU [=y] && KUNIT [=m]

WARNING: unmet direct dependencies detected for GET_FREE_REGION
  Depends on [n]: SPARSEMEM [=n]
  Selected by [m]:
  - RESOURCE_KUNIT_TEST [=m] && RUNTIME_TESTING_MENU [=y] && KUNIT [=m]

WARNING: unmet direct dependencies detected for GET_FREE_REGION
  Depends on [n]: SPARSEMEM [=n]
  Selected by [m]:
  - RESOURCE_KUNIT_TEST [=m] && RUNTIME_TESTING_MENU [=y] && KUNIT [=m]
tools/testing/selftests/arm64/tags/.gitignore: warning: ignored by one of the .gitignore files
tools/testing/selftests/arm64/tags/Makefile: warning: ignored by one of the .gitignore files
tools/testing/selftests/arm64/tags/tags_test.c: warning: ignored by one of the .gitignore files
In file included from ../include/linux/string.h:390,
                 from ../arch/x86/include/asm/page_32.h:18,
                 from ../arch/x86/include/asm/page.h:14,
                 from ../arch/x86/include/asm/processor.h:20,
                 from ../arch/x86/include/asm/timex.h:5,
                 from ../include/linux/timex.h:67,
                 from ../include/linux/time32.h:13,
                 from ../include/linux/time.h:60,
                 from ../include/linux/jiffies.h:10,
                 from ../include/linux/ktime.h:25,
                 from ../include/linux/timer.h:6,
                 from ../include/linux/workqueue.h:9,
                 from ../include/linux/bpf.h:10,
                 from ../kernel/bpf/helpers.c:4:
In function ‘fortify_memset_chk’,
    inlined from ‘bpf_probe_read_kernel_common’ at ../include/linux/bpf.h:2970:3,
    inlined from ‘bpf_iter_bits_new’ at ../kernel/bpf/helpers.c:2905:9:
../include/linux/fortify-string.h:480:25: warning: call to ‘__write_overflow_field’ declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Wattribute-warning]
  480 |                         __write_overflow_field(p_size_field, size);
      |                         ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
New errors added
--- /tmp/tmp.1yRnR3noml	2024-10-24 18:33:14.406004824 -0700
+++ /tmp/tmp.BHb1nfKT8a	2024-10-24 18:34:33.959248012 -0700
@@ -13,0 +14,20 @@
+In file included from ../include/linux/string.h:390,
+                 from ../arch/x86/include/asm/page_32.h:18,
+                 from ../arch/x86/include/asm/page.h:14,
+                 from ../arch/x86/include/asm/processor.h:20,
+                 from ../arch/x86/include/asm/timex.h:5,
+                 from ../include/linux/timex.h:67,
+                 from ../include/linux/time32.h:13,
+                 from ../include/linux/time.h:60,
+                 from ../include/linux/jiffies.h:10,
+                 from ../include/linux/ktime.h:25,
+                 from ../include/linux/timer.h:6,
+                 from ../include/linux/workqueue.h:9,
+                 from ../include/linux/bpf.h:10,
+                 from ../kernel/bpf/helpers.c:4:
+In function ‘fortify_memset_chk’,
+    inlined from ‘bpf_probe_read_kernel_common’ at ../include/linux/bpf.h:2970:3,
+    inlined from ‘bpf_iter_bits_new’ at ../kernel/bpf/helpers.c:2905:9:
+../include/linux/fortify-string.h:480:25: warning: call to ‘__write_overflow_field’ declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Wattribute-warning]
+  480 |                         __write_overflow_field(p_size_field, size);
+      |                         ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Per-file breakdown
--- /tmp/tmp.bjAntKogPC	2024-10-24 18:34:33.965247955 -0700
+++ /tmp/tmp.7eMGRncTN6	2024-10-24 18:34:33.971247898 -0700
@@ -0,0 +1 @@
+      1 ../include/linux/fortify-string.h