Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp1355205pxb; Fri, 21 Jan 2022 16:20:31 -0800 (PST) X-Google-Smtp-Source: ABdhPJwHoI9wOVpoid1H4xWS6BH57Ch8+S8Ek5t6OGo+pv5LuyHvRiL9+nB5tVnlTu7uMEADsrEk X-Received: by 2002:a17:903:11c6:b0:149:a969:7825 with SMTP id q6-20020a17090311c600b00149a9697825mr6031025plh.33.1642810831596; Fri, 21 Jan 2022 16:20:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642810831; cv=none; d=google.com; s=arc-20160816; b=CrJpqKxcjXVCcZEeG/+2kldmjUne3t/NiFEmQeBSIRAdgBl3uxrUBXIgrzS3mWrRhr Zx0kMPbwf3HfEjzz/xphvTGU10oLO+287734AgdjCvBaRzStTkdmq9fH1VVV+UdhnFu5 GooYIu37jl2HTzLc4Z4+bXxUhCUMTgDPSi5IojzGgB2KrV2VWQTV/6xwIqpeUSLC+e1q JelZ0NdG9lJWsaGqL8CvJQUb+5aRqi0N9KsjxnR42Ayg+ISTy5bEbP8f0pjcYTS5BjE5 OLEEYqCpnx6Vf/VnmfS2lJPerJcCa/Wzw2Di+PWZWdh9ktApP49ehuRF0O1zSby6PC1h HjMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=3DFeZ1TFp34Pl+W08J0c/5GgqOIQHrN13brjYVbP1e8=; b=q/3qOYIyLdGAKEIie6uUrS27IS4hz7aw4eJHpv3+q/EEUl4KQi1nXyxzu6j1V6IIGK 9oqLlKA64r0dyf//wCsr4mJp7NyPCD0bhH+VWj5rkupNN2Uw1gq5VjJdZazk8zZG5Jw2 p9C/7wgBOEsh7OymcG8bqN0GJEI2jPR+yGNgxVZm75hBwHBEtxZX6nri1Srp107C/7oY KEwoPPsEUT1660N7QR/L6AbWuG9cKYm0dF8ubG8DfD9APmoS+OtMLmXGzNEDIQUst7oI R299J1ddP8cksk6CQzT8i1UdDBdziTVSdFDROZcCXT5m0RcFzH0325dUzPt+6CiQJBqH yRCQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=OFpRNjB6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a16si3467189plh.42.2022.01.21.16.20.20; Fri, 21 Jan 2022 16:20:31 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=OFpRNjB6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1378144AbiATXJo (ORCPT + 99 others); Thu, 20 Jan 2022 18:09:44 -0500 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:52399 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1378148AbiATXJi (ORCPT ); Thu, 20 Jan 2022 18:09:38 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1642720177; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=3DFeZ1TFp34Pl+W08J0c/5GgqOIQHrN13brjYVbP1e8=; b=OFpRNjB6PqKcxiZBCc8299IhTbAresiCEhoE8AuTBeKGnmBu8VPOF1tUWR/T+e7w+FFmGL cu6dDg26EjUjrQD9nDfMO6GRUOyBLnBTJd3B7bGynLQWLF0jT/RDHBQzc7OIhQSMm1TSUR JWSAKASvEuoVt7OEbVUOIVKLUUIpbPo= Received: from mail-qt1-f197.google.com (mail-qt1-f197.google.com [209.85.160.197]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-616-idS8GwgGM3-4wi_zjQI8BQ-1; Thu, 20 Jan 2022 18:09:36 -0500 X-MC-Unique: idS8GwgGM3-4wi_zjQI8BQ-1 Received: by mail-qt1-f197.google.com with SMTP id bq17-20020a05622a1c1100b002cae8cc2d38so5169219qtb.20 for ; Thu, 20 Jan 2022 15:09:36 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=3DFeZ1TFp34Pl+W08J0c/5GgqOIQHrN13brjYVbP1e8=; b=siaYebt9LGzCzdJFwNwt52/mBoR6pxmAnIXGBv8BGulMI3H8J1kvxQGvLYyAb80tSr QKoKT2LqUl7DMUswVevDFCFq75ubG6tCEKn9Gm5/fN2JPXSuYwmwFnBEXDBW+TLyjpew FZZAHF2Ptm1oEQczvlTSKw/Npuscl20gJMZ35TeWs0uv40NFanQMM0fXcngT3dxPDg+W DfSoQG9q/4sfu1qHRi47LK9Hso3wtrs1UbIiPcclBBR/+8fVy+ugU09q4GpjC5gSVP6d 0Ku7Fu23GEdPpfCXocDYRwvjun7P5biV0RRPiIthsVuN7NMDkx9pFBn8WcJUwRhilJJV qlDQ== X-Gm-Message-State: AOAM533rpRzq559qI+LSLOzLdkaPxINTBiWyzsdbLBFnh/3C9afAD9Bz yvUENr2wKSU8g6WSNj2NZ+Bc43KcqWFcUWHIRIppeGA8YiAwFzKfARpc3T6/4at6k46qmGk//sZ zL1HlcV0bBGcRO4bb6Kg+M+OP X-Received: by 2002:a05:620a:4401:: with SMTP id v1mr935774qkp.402.1642720175782; Thu, 20 Jan 2022 15:09:35 -0800 (PST) X-Received: by 2002:a05:620a:4401:: with SMTP id v1mr935755qkp.402.1642720175564; Thu, 20 Jan 2022 15:09:35 -0800 (PST) Received: from treble ([2600:1700:6e32:6c00::c]) by smtp.gmail.com with ESMTPSA id i4sm2418596qkn.23.2022.01.20.15.09.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 20 Jan 2022 15:09:34 -0800 (PST) Date: Thu, 20 Jan 2022 15:09:32 -0800 From: Josh Poimboeuf To: Peter Zijlstra Cc: Sergei Trofimovich , linux-kernel@vger.kernel.org Subject: Re: [PATCH] objtool: check: give big enough buffer for pv_ops Message-ID: <20220120230932.vgd3sj4yuk7mhmno@treble> References: <20220114075756.838243-1-slyich@gmail.com> <20220120225810.zqpbug6oj52c34cg@treble> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20220120225810.zqpbug6oj52c34cg@treble> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 20, 2022 at 02:58:13PM -0800, Josh Poimboeuf wrote: > On Fri, Jan 14, 2022 at 09:53:07AM +0100, Peter Zijlstra wrote: > > On Fri, Jan 14, 2022 at 07:57:56AM +0000, Sergei Trofimovich wrote: > > > On gcc-12 build fails flagging possible buffer overflow: > > > > > > check.c: In function 'validate_call': > > > check.c:2865:58: error: '%d' directive output may be truncated writing between 1 and 10 bytes into a region of size 9 [-Werror=format-truncation=] > > > 2865 | snprintf(pvname, sizeof(pvname), "pv_ops[%d]", idx); > > > | ^~ > > > > > > I think it's a valid warning: > > > > > > static char pvname[16]; > > > int idx; > > > ... > > > idx = (rel->addend / sizeof(void *)); > > > snprintf(pvname, sizeof(pvname), "pv_ops[%d]", idx); > > > > > > we have only 7 chars for %d while it could take up to 9. > > > > Right, very unlikely to have that many pv_ops, but it doesn't hurt to > > fix this. > > > > Thanks! > > Alternatively, 'idx' could just be unsigned char, since pv_ops only has > about ~80 entries max, but either way works for me. I'll queue it up. Sergei, can you send a v2 with a valid Signed-off-by tag? -- Josh