Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp74151ybl; Tue, 7 Jan 2020 14:26:19 -0800 (PST) X-Google-Smtp-Source: APXvYqwQFNkFdQprjeYEljFo689b1gRhTXEsQauhA7xAARLd+2ocVYhs8io+lp5bhaXajFDawGXR X-Received: by 2002:aca:fcd1:: with SMTP id a200mr591417oii.74.1578435979749; Tue, 07 Jan 2020 14:26:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578435979; cv=none; d=google.com; s=arc-20160816; b=UXJpFpa61w9AiMA2CFuzFA7prLx9wBYn6KtmPiL1Bio38uGQDklliONAJlaeVPTfwn nPWtDksO5iAibAIAGkt/UhrmmdNDxh9byHpnYxZSNY5+Vrg+qzX5TiLLwQW4OF7tyFXb 7Ch8zr/nz/zmVZR0FMbnTGAnZmiCKMSErG7BIxrOux+xtN4xuGmY+fMQv5dTFzz9SgI8 cZJ4WsTQIO3eTnqehSdWrQro4kUGc5wGp/2/j9nrdzJ+iRZF+7qhn/dbaCeyIxci6QY1 hrOwk6ohZuWIk+PFAXWBUpr8ZJAIpvE74SpeBaNa0jrhS4wnFUdu+mONR5rD7iasnxUO 7FwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=mTS4ADRRdxppa4NE3A/IONa2wXp33J/Uqlwdkuig47Y=; b=D+YOl5vKG7t0hQQlSVUzhNo3EVBRD6FwvnTGTVZ6CbgaK54+F66yDRWN4igpGdpClb 5YPN1GvXRN2a58VsE7CoiyWyM+fKnA/euCPV+xBfP2fa+vQaV83TH3tkqt1qlylfVTFP 9ai6jktoJkQTF8+pg5StyfBzkagglL8MJmMvinf+tzhu9eZ2AuXN38I3F7z8ljtRNa+h p+xd/VlGYAncZPfuHDBZqQGsXswe0V6fTEzPewE5DsS5oN4ODKZngrjpdgL4t6IHzqyi BjcEphJkHh3M8E24lLw8COLadg7Y2br9p6ZIPy2MJXKcNzakiN8ykmsmTI/UJbj5YeCU 3V7Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LjnYP2Wt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a20si655640otf.271.2020.01.07.14.26.08; Tue, 07 Jan 2020 14:26:19 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LjnYP2Wt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727188AbgAGWZO (ORCPT + 99 others); Tue, 7 Jan 2020 17:25:14 -0500 Received: from mail.kernel.org ([198.145.29.99]:39034 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726558AbgAGWZO (ORCPT ); Tue, 7 Jan 2020 17:25:14 -0500 Received: from localhost.localdomain (c-73-231-172-41.hsd1.ca.comcast.net [73.231.172.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F3DEA206DB; Tue, 7 Jan 2020 22:25:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578435913; bh=ck4c7UJ9ZG5qWrKFy9xztVIZezQr5I8+IAhGkqjM2wo=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=LjnYP2WtPxOf1+s588IKoPoQVbQS95f9r2Tm6C45d4QkS3w5bt0sdSroqMOUdQvpv 0kiMXWQ2G04zlLAjsQtwAVQZhAI3ggQxSYs35zfx78MEZx3H4qwXMb+q1w8VPwzJAl iZocijQ+jIbbVfEkp/KVespF2ONYI7c7xk27OxQw= Date: Tue, 7 Jan 2020 14:25:12 -0800 From: Andrew Morton To: Arnd Bergmann Cc: Oleksandr Natalenko , linux-mm@kvack.org, Arnaldo Carvalho de Melo , Will Deacon , Masami Hiramatsu , Song Liu , Alexey Dobriyan , Marc Zyngier , Thomas Gleixner , linux-kernel@vger.kernel.org Subject: Re: [PATCH] kallsyms: work around bogus -Wrestrict warning Message-Id: <20200107142512.b3d63df56ffee1ef471b6acd@linux-foundation.org> In-Reply-To: <20200107214042.855757-1-arnd@arndb.de> References: <20200107214042.855757-1-arnd@arndb.de> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 7 Jan 2020 22:40:26 +0100 Arnd Bergmann wrote: > gcc -O3 produces some really odd warnings for this file: > > kernel/kallsyms.c: In function 'sprint_symbol': > kernel/kallsyms.c:369:3: error: 'strcpy' source argument is the same as destination [-Werror=restrict] > strcpy(buffer, name); > ^~~~~~~~~~~~~~~~~~~~ > kernel/kallsyms.c: In function 'sprint_symbol_no_offset': > kernel/kallsyms.c:369:3: error: 'strcpy' source argument is the same as destination [-Werror=restrict] > strcpy(buffer, name); > ^~~~~~~~~~~~~~~~~~~~ > kernel/kallsyms.c: In function 'sprint_backtrace': > kernel/kallsyms.c:369:3: error: 'strcpy' source argument is the same as destination [-Werror=restrict] > strcpy(buffer, name); > ^~~~~~~~~~~~~~~~~~~~ > > This obviously cannot be since it is preceded by an 'if (name != buffer)' > check. > > Using sprintf() instead of strcpy() is a bit wasteful but is > the best workaround I could come up with. > > ... > > --- a/kernel/kallsyms.c > +++ b/kernel/kallsyms.c > @@ -366,7 +366,7 @@ static int __sprint_symbol(char *buffer, unsigned long address, > return sprintf(buffer, "0x%lx", address - symbol_offset); > > if (name != buffer) > - strcpy(buffer, name); > + sprintf(buffer, "%s", name); > len = strlen(buffer); > offset -= symbol_offset; gee, is that even worth "fixing"? Oleksandr, I've seen a couple of these false positives. Do we know if anyone is taking them to the gcc developers?