From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3A815C04A94 for ; Wed, 9 Aug 2023 18:29:48 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id A10D96B0071; Wed, 9 Aug 2023 14:29:47 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 9C0676B0074; Wed, 9 Aug 2023 14:29:47 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 888CA8E0001; Wed, 9 Aug 2023 14:29:47 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 796F96B0071 for ; Wed, 9 Aug 2023 14:29:47 -0400 (EDT) Received: from smtpin29.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 2ABA1140F36 for ; Wed, 9 Aug 2023 18:29:47 +0000 (UTC) X-FDA: 81105404814.29.0247DAA Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.120]) by imf21.hostedemail.com (Postfix) with ESMTP id 935B41C0011 for ; Wed, 9 Aug 2023 18:29:44 +0000 (UTC) Authentication-Results: imf21.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b="LEN1Mft/"; spf=pass (imf21.hostedemail.com: domain of lkp@intel.com designates 192.55.52.120 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1691605785; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=X4zPWnTHEG5cR17uGhEAsQqyrcEYmyMmKGPe5j9ZPmE=; b=1crTSr8J50H7WO27ZHnnKADq767P85nsGXM51EDBk4BpT/iOgNKn+joo0Jo7lxdALpHfe4 CZJdUjMhf+X+1fkBsXdeMOYreeB9f184XgQ8JA1AeDajGWbQcKhZyxTKZ18OBO7+Mu31im gHFpXJIvU7s51qqPvdJ5N/NiTF1fhe0= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1691605785; a=rsa-sha256; cv=none; b=8akqyptdtFGaMse5U+wyVmThmg2tfYp84SxXRXWXN56mkkItGVruPwNiysGhtaQqXAJjes MuSXymOR/+lpsOgbrhYp5nvZYuH+yAd2eTxv8Ut5qiQZorLQLZEfowhejf5G0Yh3C7ODwb 8rbtWaoOMAOc5qA1V1U7c68Nn5SlEbg= ARC-Authentication-Results: i=1; imf21.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b="LEN1Mft/"; spf=pass (imf21.hostedemail.com: domain of lkp@intel.com designates 192.55.52.120 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1691605784; x=1723141784; h=date:from:to:cc:subject:message-id:mime-version; bh=zsTZ2pOARin2SBZwGNQ4ceunjn3tsWV4YskTSGbYrt0=; b=LEN1Mft/SQLTUQwNTs044n4ZDvwxPz1QYOgY43o1MX0kwMsPnJerjFWX PmdBwYtgoJzvMGvZDNR+PmD2g0LzZfcu39wCX9YgQhB6OpzQACVBtJm3W VyxB9jM7dMh22OoBx9e9YImhvU7GETU0NzBDBLnP5FWjkWuZSISbxXaKO aVKXJnG/Z87cCkZpElF3VSY26c1cD8+T+TflR3SbieM6aXcI3NYcs487F +HrlQ0RV7siJf2N5DEUEEotBDCRkjwjuGDD2OD6o8+hPQCJULt9caF44j 9ynK4VLGnNxNCbuUiyncIG67+WeoWboqS/fPqJqVpVnudsxudWZLsYqyv g==; X-IronPort-AV: E=McAfee;i="6600,9927,10797"; a="370099539" X-IronPort-AV: E=Sophos;i="6.01,159,1684825200"; d="scan'208";a="370099539" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Aug 2023 11:29:43 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10797"; a="846078966" X-IronPort-AV: E=Sophos;i="6.01,159,1684825200"; d="scan'208";a="846078966" Received: from lkp-server01.sh.intel.com (HELO d1ccc7e87e8f) ([10.239.97.150]) by fmsmga002.fm.intel.com with ESMTP; 09 Aug 2023 11:29:41 -0700 Received: from kbuild by d1ccc7e87e8f with local (Exim 4.96) (envelope-from ) id 1qTnwD-0006K0-0K; Wed, 09 Aug 2023 18:29:41 +0000 Date: Thu, 10 Aug 2023 02:29:07 +0800 From: kernel test robot To: Marco Elver Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, Linux Memory Management List , Andrew Morton Subject: [linux-next:master 8173/8441] warning: unsafe strcpy() usage lacked '__write_overflow' warning in lib/test_fortify/write_overflow-strcpy.c Message-ID: <202308100247.oHTlRKLx-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspamd-Queue-Id: 935B41C0011 X-Rspam-User: X-Stat-Signature: f6i7kaahy6oiy4hd6fbwgr8a3runxgmg X-Rspamd-Server: rspam03 X-HE-Tag: 1691605784-491479 X-HE-Meta: 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 eMBOOtFQ w4FR741cpqFHzG4y5vPsaIpnqr02HjHxu+LOLJfh4t1HYxmFIvW4ARC3JT79KDC3XLvlp3pu1MB868SHuKjwvUl3XGaKFX/uwhNjMErMjlCtlK6e3JkBd59U7wYIHnXOp7lplpuv6fosDEjGvbt7LPZTnIC5UAJANQbgDVQUDLqcMe3rlStExRbBs1RACDev1vT/Zaac+D6IIevpcFZ7B4z05tic+OVcX3ECbf7KdBpruQPliby30f6cdXzV+FjV5UreuG0eD9Za3jzsWGhrfXwKZHCQGis+TPpQ+USnbpFPnVwPgvypWCuWPscL+WLCLDiOJDWgohyz7JZgfiPU5wySUzqIpAg9zO0VY X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master head: 21ef7b1e17d039053edaeaf41142423810572741 commit: fee8feb67f0b2954eb7a2a259122e43a15cf3a52 [8173/8441] list_debug: introduce CONFIG_DEBUG_LIST_MINIMAL config: arm-randconfig-r005-20230809 (https://download.01.org/0day-ci/archive/20230810/202308100247.oHTlRKLx-lkp@intel.com/config) compiler: clang version 17.0.0 (https://github.com/llvm/llvm-project.git 4a5ac14ee968ff0ad5d2cc1ffa0299048db4c88a) reproduce: (https://download.01.org/0day-ci/archive/20230810/202308100247.oHTlRKLx-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202308100247.oHTlRKLx-lkp@intel.com/ All warnings (new ones prefixed by >>): >> warning: unsafe strcpy() usage lacked '__write_overflow' warning in lib/test_fortify/write_overflow-strcpy.c -- >> warning: unsafe memcpy() usage lacked '__write_overflow' warning in lib/test_fortify/write_overflow-memcpy.c -- >> warning: unsafe memcmp() usage lacked '__read_overflow2' warning in lib/test_fortify/read_overflow2-memcmp.c -- >> warning: unsafe strlcpy() usage lacked '__write_overflow' warning in lib/test_fortify/write_overflow-strlcpy-src.c -- >> warning: unsafe memmove() usage lacked '__read_overflow2_field' warning in lib/test_fortify/read_overflow2_field-memmove.c -- >> warning: unsafe strncpy() usage lacked '__write_overflow' warning in lib/test_fortify/write_overflow-strncpy-src.c -- >> warning: unsafe memset() usage lacked '__write_overflow_field' warning in lib/test_fortify/write_overflow_field-memset.c -- >> warning: unsafe memcmp() usage lacked '__read_overflow' warning in lib/test_fortify/read_overflow-memcmp.c -- >> warning: unsafe memmove() usage lacked '__read_overflow2' warning in lib/test_fortify/read_overflow2-memmove.c -- >> warning: unsafe strlcpy() usage lacked '__write_overflow' warning in lib/test_fortify/write_overflow-strlcpy.c -- >> warning: unsafe memscan() usage lacked '__read_overflow' warning in lib/test_fortify/read_overflow-memscan.c .. -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki