From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id B2972C001B0 for ; Wed, 9 Aug 2023 18:33:23 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 531246B0071; Wed, 9 Aug 2023 14:33:23 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 4E16A8E0001; Wed, 9 Aug 2023 14:33:23 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 3A96A6B0078; Wed, 9 Aug 2023 14:33:23 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 2ABE66B0071 for ; Wed, 9 Aug 2023 14:33:23 -0400 (EDT) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id E93A3C0E9A for ; Wed, 9 Aug 2023 18:33:22 +0000 (UTC) X-FDA: 81105413844.21.FA1E5C4 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf01.hostedemail.com (Postfix) with ESMTP id 45C5140020 for ; Wed, 9 Aug 2023 18:33:20 +0000 (UTC) Authentication-Results: imf01.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=S1w2TleP; spf=pass (imf01.hostedemail.com: domain of nathan@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=nathan@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1691606001; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=P26sTc3JhiBTh7WjoMxyup/Snnjxnk0W0eFn+D0TQC4=; b=zChtxYL6M/JDBYb7p4jveGH7SNgxRc8g+tJIOGSkZUGn6Q8HZVSDFxlOHH3bYYOVF0Vmns hlkuCg16UmEuL6Tq3CHzUKyJFX9Ok87PR6eE5JVoyhhMA1mKUELbhPIG9IiXdTB09PnLES mIn6mF2LbLLRgTMNlRBOYRnzpjZGnRo= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1691606001; a=rsa-sha256; cv=none; b=qEf7McxL7jw1xNBlpCL0Gu74AchxvKkD0o0m8AWrcr7fLMBj2vozcIFr1wyP5RuuImievO xUjC8edRaCDDQMIm6FQxx9m0iglHtYBiH3rE6uHI+Qz/RpMTC1Ymklw9grJGUrEUZYSeGK znmLoMACIvuxexGrEgHOIv6JwBMswE0= ARC-Authentication-Results: i=1; imf01.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=S1w2TleP; spf=pass (imf01.hostedemail.com: domain of nathan@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=nathan@kernel.org; dmarc=pass (policy=none) header.from=kernel.org Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 2DF91643FD; Wed, 9 Aug 2023 18:33:20 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 39E28C433C7; Wed, 9 Aug 2023 18:33:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1691605999; bh=7i+9CZK9MTaE9M7KFWMrFjix2XVGqj+IDgNiugKyaT0=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=S1w2TlePhvk7HcDcIsb7svaPCa819NKHF12VKGYF+kbx591ztOJhOO9E3aZ75AiPX GVbd4rNdohVfZoiN5SuSo3K90Su1q0WWLw3VywIRAJMbcTfWRPpx4EqYGe2E2uFxpV DgFNn0aEK45zvRrAbqat2Qnun2Kei3vYCQc3Rn2FxrKDzXwnHcGuBs1+bh8Hkde+aq Krk9BzyQudSbXU8+rBDMKbJJDyKyya+1NnWzS/0JGxk0OJ8V7ya3brQUon0SoXqtQQ 2X+GVs69kK7VOJNuTvAK39oOH0l+J7v3Cy8pKU+wDIOEdCZp7MDGL4c2Is2IMA3K4v UnmCayoG4kA6g== Date: Wed, 9 Aug 2023 11:33:17 -0700 From: Nathan Chancellor To: kernel test robot Cc: Marco Elver , llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, Linux Memory Management List , Andrew Morton Subject: Re: [linux-next:master 8173/8441] warning: unsafe strcpy() usage lacked '__write_overflow' warning in lib/test_fortify/write_overflow-strcpy.c Message-ID: <20230809183317.GA3355565@dev-arch.thelio-3990X> References: <202308100247.oHTlRKLx-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <202308100247.oHTlRKLx-lkp@intel.com> X-Rspamd-Queue-Id: 45C5140020 X-Rspam-User: X-Rspamd-Server: rspam11 X-Stat-Signature: mudykt3xkcoqp1qke1p4mwzahffyp7ki X-HE-Tag: 1691606000-829877 X-HE-Meta: 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 MR7IlrLZ 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Thu, Aug 10, 2023 at 02:29:07AM +0800, kernel test robot wrote: > tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master > head: 21ef7b1e17d039053edaeaf41142423810572741 > commit: fee8feb67f0b2954eb7a2a259122e43a15cf3a52 [8173/8441] list_debug: introduce CONFIG_DEBUG_LIST_MINIMAL > config: arm-randconfig-r005-20230809 (https://download.01.org/0day-ci/archive/20230810/202308100247.oHTlRKLx-lkp@intel.com/config) > compiler: clang version 17.0.0 (https://github.com/llvm/llvm-project.git 4a5ac14ee968ff0ad5d2cc1ffa0299048db4c88a) > reproduce: (https://download.01.org/0day-ci/archive/20230810/202308100247.oHTlRKLx-lkp@intel.com/reproduce) > > If you fix the issue in a separate patch/commit (i.e. not just a new version of > the same patch/commit), kindly add following tags > | Reported-by: kernel test robot > | Closes: https://lore.kernel.org/oe-kbuild-all/202308100247.oHTlRKLx-lkp@intel.com/ > > All warnings (new ones prefixed by >>): > > >> warning: unsafe strcpy() usage lacked '__write_overflow' warning in lib/test_fortify/write_overflow-strcpy.c > -- > >> warning: unsafe memcpy() usage lacked '__write_overflow' warning in lib/test_fortify/write_overflow-memcpy.c > -- > >> warning: unsafe memcmp() usage lacked '__read_overflow2' warning in lib/test_fortify/read_overflow2-memcmp.c > -- > >> warning: unsafe strlcpy() usage lacked '__write_overflow' warning in lib/test_fortify/write_overflow-strlcpy-src.c > -- > >> warning: unsafe memmove() usage lacked '__read_overflow2_field' warning in lib/test_fortify/read_overflow2_field-memmove.c > -- > >> warning: unsafe strncpy() usage lacked '__write_overflow' warning in lib/test_fortify/write_overflow-strncpy-src.c > -- > >> warning: unsafe memset() usage lacked '__write_overflow_field' warning in lib/test_fortify/write_overflow_field-memset.c > -- > >> warning: unsafe memcmp() usage lacked '__read_overflow' warning in lib/test_fortify/read_overflow-memcmp.c > -- > >> warning: unsafe memmove() usage lacked '__read_overflow2' warning in lib/test_fortify/read_overflow2-memmove.c > -- > >> warning: unsafe strlcpy() usage lacked '__write_overflow' warning in lib/test_fortify/write_overflow-strlcpy.c > -- > >> warning: unsafe memscan() usage lacked '__read_overflow' warning in lib/test_fortify/read_overflow-memscan.c > .. I suspect this is a symptom of https://lore.kernel.org/all/202308092009.dDIMqss4-lkp@intel.com/, as the fortify tests build with -Werror. Cheers, Nathan