From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3547FC4167B for ; Sat, 9 Dec 2023 19:08:15 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 834E46B007E; Sat, 9 Dec 2023 14:08:14 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 7E7666B0081; Sat, 9 Dec 2023 14:08:14 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 6D4716B0082; Sat, 9 Dec 2023 14:08:14 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 5EA1A6B007E for ; Sat, 9 Dec 2023 14:08:14 -0500 (EST) Received: from smtpin13.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id 332571A03B8 for ; Sat, 9 Dec 2023 19:08:14 +0000 (UTC) X-FDA: 81548215308.13.3A76D2D Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.7]) by imf27.hostedemail.com (Postfix) with ESMTP id E795940005 for ; Sat, 9 Dec 2023 19:08:10 +0000 (UTC) Authentication-Results: imf27.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=kAzsJVMJ; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf27.hostedemail.com: domain of lkp@intel.com designates 192.198.163.7 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1702148892; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=ZKtdp2BjxssMjnhgbMIdhAcZM01jHSWCt95U3gh6Xv8=; b=DGJSycXIjn8w9FzYF+a9CHELpVHu0WXvIbipAh28Y5GfHCA+qFvN7OUOjjtBZxGzETQxuK y/TzPfGFMLEKhcYoCmA2jdkK5kkyUtgRXcEyIZzbJPnLfA3rOWMXKhSyPLFfesFptQFTFy IvOJb8RzIJBuDRgKfwIxEqFQ/JZ+cYI= ARC-Authentication-Results: i=1; imf27.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=kAzsJVMJ; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf27.hostedemail.com: domain of lkp@intel.com designates 192.198.163.7 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1702148892; a=rsa-sha256; cv=none; b=B2+sT+Mg3qMvkHOrxXPkrhQotvA+Q3KtvLyxXGAzYri6YVoPw+ua8AZra+QVfihizdPklK WRBZzENC3Z6W10b1Jqop6sbk30Vs1baTnmkaW+hrnlPun51gQltmFlV6lTrBZULwzNFlbb d+jcyxXRRtHd4n+rEHtXkJr0KnWRUwE= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1702148891; x=1733684891; h=date:from:to:cc:subject:message-id:mime-version; bh=B1kQg7J9907SlOlnirWbA1kwjXEhu8Z2YMCu2e9KBJo=; b=kAzsJVMJmYsJDq0rvtIROvPR6Ebqo71bWLnoRiuzaKF3n+Yj/eb6zrrb izUtsALuiF1m1Ip45kVH8q54OfP1NlWPZ98u/RVemvBy/B+uw6PQxxROu GNRuI32W92K7HUkUcAlMyILc6upNY1ErFgakYEoFQuydY7o3RF/1lIq5/ N/x3lXX+X4fOMax+Wq27LjBKzw6gC/AiLxIQSrtGtgFlkf1E9CJ6oisO9 +ynVCmTG0JiBszVKw3cM2thA8g/wVG9Ov+fXNUUKEoF3vlXTngBLceuH8 94dRYZ6hbZ2skMoRmdd2VZfZ8m7xkxTLq1seITXuvi/Uf63UByK8JsyZl Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10919"; a="16074332" X-IronPort-AV: E=Sophos;i="6.04,264,1695711600"; d="scan'208";a="16074332" Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by fmvoesa101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Dec 2023 11:08:09 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10919"; a="776152961" X-IronPort-AV: E=Sophos;i="6.04,264,1695711600"; d="scan'208";a="776152961" Received: from lkp-server02.sh.intel.com (HELO b07ab15da5fe) ([10.239.97.151]) by fmsmga007.fm.intel.com with ESMTP; 09 Dec 2023 11:08:06 -0800 Received: from kbuild by b07ab15da5fe with local (Exim 4.96) (envelope-from ) id 1rC2gG-000FoD-2h; Sat, 09 Dec 2023 19:08:04 +0000 Date: Sun, 10 Dec 2023 03:07:36 +0800 From: kernel test robot To: Daniel Axtens Cc: oe-kbuild-all@lists.linux.dev, linux-kernel@vger.kernel.org, Francis Laniel , Kees Cook , Andrew Morton , Linux Memory Management List Subject: drivers/block/rnbd/rnbd-srv.c:616:51: warning: '%s' directive output may be truncated writing up to 254 bytes into a region of size between 0 and 4095 Message-ID: <202312100355.lHoJPgKy-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspamd-Queue-Id: E795940005 X-Rspam-User: X-Rspamd-Server: rspam04 X-Stat-Signature: 3mns5y8gz9uk651ez3kkpgpitq936dbq X-HE-Tag: 1702148890-648994 X-HE-Meta: U2FsdGVkX1+QoiOww5vy+sgoXxfkduWB7ja6A5X0ZeMxhtNgVCWUNOLpzmYhrbWHL6ne3WwEsCQpi18c/qQE3uDjB/YRJPVva5qME+7AALhvA0lFV/6wg8VovXH/np6ohm3O2Ragb23Ac+ZjWZQ9m28a2jW66L5yEpdRiDelYueURQppJa9v1bL0rDlFd0+Hcb1Z4ZG1hosqgtLHz5RQ1zj4kkDt1HHNpWUffALPYiUZrZ+d0F5dK/HUlsXVaUau85jYSDK2uqHvz9w18j0prgKPlWriV414dzYUoCi0onvl44voaDzJL+bMe/ZNAJLEng9vhMPO9Zdb74+BpXFKIqncz4uJs/jPmVW6Xmzkh+sva7a1l4hLiNNc7ktD3H+Ux6SPdjN51dshzO6Rchv/KJtvks6y9Q1ryyRVMgfZPC/44k0RjxXJpU3H5Xg+hmJ0WxP2fWboJiYT4/DYO8Q8HXbFfYuKxhnBtEKQwHXXsZPna7yTfpp7AOw5VXdF/Y99w1CgQJ9JIntkFJv13XAMl1iWIXtevt+IUScVZWK4tjkq+JKX6LUZT2vRvXGAVryY78O9xQetHEamaZ0S4JnLMFJg8xFTx5C4kvDcg0mIbD272nSgAzcgPzGNXFrR3rZ55xKmzX9jI7Eh1fqgAeWQuOw53HvesrHETvZ2+I3bjSA/gVfSySPUuyHMEWYqpdH6zyswmwqyS82rkI5Dw8y0Xm8p09UsJugLRNJa4r4i9mbk3UVm59Z0cFJOqB+ZSER38Nu0NBcptHnsMm0xUm5+wFMWpSyu+gRuTbwEgJaXsItfW4GZoXGFkPNrN8OdfvXSc193bqP8NFtIMRKWZ6Wty8S4SJ/ZCebAkCuMmc121i+GFvVfKBABdLfxcA/btb1PjL848OK6WAfU2NPBqDOY55S9Wd3Yesokv2ERsQjxYNCLAZHEAboHSmtklAPPM/qOsRJbyjySQCVCG80pccV drVaRmgK WExTJu40Y0TbAjyXhrEwFM5xa1H3Tm/8zGTkWS84mzJdXh69IwdR6Nzkki83HUG7yCy/qxKhfGC+vpqmOVjCzme609rIc9p6SnDbxjheLUAQc13EC2psrGNz2ioN1QBG3dBVgl4HGasFGp7q0/SRT7+WtbviKFHVmydAqhY8bQDb9Td3KDTtQUW5ELQOpDErtx8sIpR62zXYuu2niaASJz1Tm8aVmtzdyseRoC/QN0mfKC6uO3SfUaJMkdYPTdmFZw0h6KyMnOR6QhBaWagJ7AZf9FFEyujS9XVQ38+By501FxGV8ssSA2d5pA1B146N5G8qWf+oEXP5TlKrziqB86yo3T9kx0xqIjkLh8H23h7SKLC45p9u1I1HJ5M9iN7AapWDoYtkvlTn+Bf0awJnIkh+aqyGP5Lbw45IyoP7SpcCC6fGPSofwRYuArcldhT/tskc1v966+XsS+QeWAwG3JGFYCeswoRTL9kyKAHgLn0kjDN4raOMT8tYFig== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master head: f2e8a57ee9036c7d5443382b6c3c09b51a92ec7e commit: 6a39e62abbafd1d58d1722f40c7d26ef379c6a2f lib: string.h: detect intra-object overflow in fortified string functions date: 3 years ago config: arm64-allmodconfig (https://download.01.org/0day-ci/archive/20231210/202312100355.lHoJPgKy-lkp@intel.com/config) compiler: aarch64-linux-gcc (GCC) 13.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231210/202312100355.lHoJPgKy-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202312100355.lHoJPgKy-lkp@intel.com/ All warnings (new ones prefixed by >>): drivers/block/rnbd/rnbd-srv.c: In function 'process_msg_open.isra': >> drivers/block/rnbd/rnbd-srv.c:616:51: warning: '%s' directive output may be truncated writing up to 254 bytes into a region of size between 0 and 4095 [-Wformat-truncation=] 616 | snprintf(full_path, PATH_MAX, "%s/%s", | ^~ In function 'rnbd_srv_get_full_path', inlined from 'process_msg_open.isra' at drivers/block/rnbd/rnbd-srv.c:721:14: drivers/block/rnbd/rnbd-srv.c:616:17: note: 'snprintf' output between 2 and 4351 bytes into a destination of size 4096 616 | snprintf(full_path, PATH_MAX, "%s/%s", | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 617 | dev_search_path, dev_name); | ~~~~~~~~~~~~~~~~~~~~~~~~~~ vim +616 drivers/block/rnbd/rnbd-srv.c 2de6c8de192b934 Jack Wang 2020-05-11 588 2de6c8de192b934 Jack Wang 2020-05-11 589 static char *rnbd_srv_get_full_path(struct rnbd_srv_session *srv_sess, 2de6c8de192b934 Jack Wang 2020-05-11 590 const char *dev_name) 2de6c8de192b934 Jack Wang 2020-05-11 591 { 2de6c8de192b934 Jack Wang 2020-05-11 592 char *full_path; 2de6c8de192b934 Jack Wang 2020-05-11 593 char *a, *b; 2de6c8de192b934 Jack Wang 2020-05-11 594 2de6c8de192b934 Jack Wang 2020-05-11 595 full_path = kmalloc(PATH_MAX, GFP_KERNEL); 2de6c8de192b934 Jack Wang 2020-05-11 596 if (!full_path) 2de6c8de192b934 Jack Wang 2020-05-11 597 return ERR_PTR(-ENOMEM); 2de6c8de192b934 Jack Wang 2020-05-11 598 2de6c8de192b934 Jack Wang 2020-05-11 599 /* 2de6c8de192b934 Jack Wang 2020-05-11 600 * Replace %SESSNAME% with a real session name in order to 2de6c8de192b934 Jack Wang 2020-05-11 601 * create device namespace. 2de6c8de192b934 Jack Wang 2020-05-11 602 */ 2de6c8de192b934 Jack Wang 2020-05-11 603 a = strnstr(dev_search_path, "%SESSNAME%", sizeof(dev_search_path)); 2de6c8de192b934 Jack Wang 2020-05-11 604 if (a) { 2de6c8de192b934 Jack Wang 2020-05-11 605 int len = a - dev_search_path; 2de6c8de192b934 Jack Wang 2020-05-11 606 2de6c8de192b934 Jack Wang 2020-05-11 607 len = snprintf(full_path, PATH_MAX, "%.*s/%s/%s", len, 2de6c8de192b934 Jack Wang 2020-05-11 608 dev_search_path, srv_sess->sessname, dev_name); 2de6c8de192b934 Jack Wang 2020-05-11 609 if (len >= PATH_MAX) { 2de6c8de192b934 Jack Wang 2020-05-11 610 pr_err("Too long path: %s, %s, %s\n", 2de6c8de192b934 Jack Wang 2020-05-11 611 dev_search_path, srv_sess->sessname, dev_name); 2de6c8de192b934 Jack Wang 2020-05-11 612 kfree(full_path); 2de6c8de192b934 Jack Wang 2020-05-11 613 return ERR_PTR(-EINVAL); 2de6c8de192b934 Jack Wang 2020-05-11 614 } 2de6c8de192b934 Jack Wang 2020-05-11 615 } else { 2de6c8de192b934 Jack Wang 2020-05-11 @616 snprintf(full_path, PATH_MAX, "%s/%s", 2de6c8de192b934 Jack Wang 2020-05-11 617 dev_search_path, dev_name); 2de6c8de192b934 Jack Wang 2020-05-11 618 } 2de6c8de192b934 Jack Wang 2020-05-11 619 2de6c8de192b934 Jack Wang 2020-05-11 620 /* eliminitate duplicated slashes */ 2de6c8de192b934 Jack Wang 2020-05-11 621 a = strchr(full_path, '/'); 2de6c8de192b934 Jack Wang 2020-05-11 622 b = a; 2de6c8de192b934 Jack Wang 2020-05-11 623 while (*b != '\0') { 2de6c8de192b934 Jack Wang 2020-05-11 624 if (*b == '/' && *a == '/') { 2de6c8de192b934 Jack Wang 2020-05-11 625 b++; 2de6c8de192b934 Jack Wang 2020-05-11 626 } else { 2de6c8de192b934 Jack Wang 2020-05-11 627 a++; 2de6c8de192b934 Jack Wang 2020-05-11 628 *a = *b; 2de6c8de192b934 Jack Wang 2020-05-11 629 b++; 2de6c8de192b934 Jack Wang 2020-05-11 630 } 2de6c8de192b934 Jack Wang 2020-05-11 631 } 2de6c8de192b934 Jack Wang 2020-05-11 632 a++; 2de6c8de192b934 Jack Wang 2020-05-11 633 *a = '\0'; 2de6c8de192b934 Jack Wang 2020-05-11 634 2de6c8de192b934 Jack Wang 2020-05-11 635 return full_path; 2de6c8de192b934 Jack Wang 2020-05-11 636 } 2de6c8de192b934 Jack Wang 2020-05-11 637 :::::: The code at line 616 was first introduced by commit :::::: 2de6c8de192b9341ffa5e84afe1ce6196d4eef41 block/rnbd: server: main functionality :::::: TO: Jack Wang :::::: CC: Jason Gunthorpe -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki