Received: by 2002:a05:7412:798b:b0:fc:a2b0:25d7 with SMTP id fb11csp579517rdb; Thu, 22 Feb 2024 12:34:33 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCV2cc8/gHnzfayPmXD8o0kYIdZO3wnlQYbIU222AZnf+gcyKeaK88XrFZ22dJy8nur/y5WcKmrNlZsDWgSc9ktUPUBl4B4P0DO9Xsqn8Q== X-Google-Smtp-Source: AGHT+IF6nZo1qVrNHce1ycKl2YGupgOJaBga6KfLLidLSvoq0+IL9qEWW7oTQZQJNW2Bz05J+d5U X-Received: by 2002:a05:6a20:9592:b0:1a0:d1df:aa8e with SMTP id iu18-20020a056a20959200b001a0d1dfaa8emr3816107pzb.48.1708634072866; Thu, 22 Feb 2024 12:34:32 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708634072; cv=pass; d=google.com; s=arc-20160816; b=t4hqr8sI+3I1xOVUSo7bhR+JoeLk+h31PQHkhrAMHj/cWkxUIbU9cniZ11lyF+dPDU tt+wiSLtskdkJ3GYHP74THhOEaKQCZ3YOaMimwatj+Jz08SrtJcL7sbWntMaxTvQ+kmu UVtUKdK2D9AmT/qMmWR+3bPPELYjyQ/aDJbhCk1vZH75rVQWZ6F3VbPJf5aNbdqavnDD kx+bQuBCyuYE+IXTzVgwnpFlE3sKTzl3Jvl83zPsoyyvt3vWhlCoqZAQc+AQvUVm64WZ IFweAfEOBgtWNRism9Q29Ib50Whby8HannBOH9dEOsp6XHjk7nZHrPNJOwqnvYLF1iTK 9lww== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-disposition:mime-version:list-unsubscribe:list-subscribe :list-id:precedence:message-id:subject:cc:to:from:date :dkim-signature; bh=niJyls1Pg7BpWjDqb3bQJXw4aZuF2oWXrh8TZHtFKYo=; fh=bwS1e7iQ1zchzn3EFeiQ7wC/t0iuIgwyA9xuPp9Seec=; b=o2iZ3+0PUCDhwJnyW7Lnydk4wGEwBKkgGcrjtkRP0j48+Njm7QVJUKRToj6Iap/UPG J8cBn/4ZS6XCOGWMP0kMUzfAD2uwKLU9KXMlAmxyuNfYC/n0xKHJcD0uCvoVuoVA+2qq X2BnyclkMpzT0wFKskM5NxNAzzxOm1FRop4rSRfm8pL4wwQ/Np3zNkPr/rpd7wd3EX9j Zxjct08DM/XHCHow8L+ldArKp7YbzRx10IdeZYpAzT/IV3Ox6vOF4y0bvYv1vDrmupYu A9GTTF9XyQ3PWJHwTC3JuTN12s9nCJgrF9AVYZFzSg0HU0+WxhOxwfrW3GI9zLcKRNOw CVFg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=BsrezVh9; arc=pass (i=1 spf=pass spfdomain=intel.com dkim=pass dkdomain=intel.com dmarc=pass fromdomain=intel.com); spf=pass (google.com: domain of linux-kernel+bounces-77323-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-77323-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id 16-20020a056a00071000b006e243cf00ffsi10361861pfl.163.2024.02.22.12.34.32 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 22 Feb 2024 12:34:32 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-77323-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=BsrezVh9; arc=pass (i=1 spf=pass spfdomain=intel.com dkim=pass dkdomain=intel.com dmarc=pass fromdomain=intel.com); spf=pass (google.com: domain of linux-kernel+bounces-77323-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-77323-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 8BF5A28AF99 for ; Thu, 22 Feb 2024 20:34:32 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id F30FF71729; Thu, 22 Feb 2024 20:34:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="BsrezVh9" Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 57EAB10A05 for ; Thu, 22 Feb 2024 20:34:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.15 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708634067; cv=none; b=ZvPYFgA0Zb0PSLYdsrCyBboVRFWa3RtmKLs0jALEMBj+Yr87fs6dP9G8h4Mmz8WPVVFKt93hDIvW5ih7eAaYMkenMxuFrGuqDQdrUaMXnPPkuBZfVIuKVaXSOdWL9VenOnUfiV1JA/lXtDI+Gyb1l/Zv2V8bDOz8yl5iZ8O6m3A= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708634067; c=relaxed/simple; bh=XV3XtNmk1rLqA9pWexMVzg3cWtGVbvk/xP9jVQ60UBw=; h=Date:From:To:Cc:Subject:Message-ID:MIME-Version:Content-Type: Content-Disposition; b=A96cBTxWU3liLgR0xcaqP3ZjrwscvYu9b4rAIoxgejiUaJQtBe4qyBFb7Zm+4xVsSrG2feE1LKIuCIPyVWZxoxE9FlC23BwnNF3lB4AfulFFZvJ5QhhhNfvysCd0TztVUEvAtOdsxi4HCa+gK6SNsVOFLEbAe2M546kd1shQRuU= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=BsrezVh9; arc=none smtp.client-ip=192.198.163.15 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1708634066; x=1740170066; h=date:from:to:cc:subject:message-id:mime-version; bh=XV3XtNmk1rLqA9pWexMVzg3cWtGVbvk/xP9jVQ60UBw=; b=BsrezVh9Mzu2zVrRSABHuY1CCHxWbClqiFY7/SB87Nr8RY7RUkakfKQL RIh9+CW7NS1wEg4Xcn++ExbR9Xhw4yGGgZ1w+NI9G4lGvZJfdJUMb+RlZ 2ia8QdgtM77ARczdEaXzgmIDUKpkL/hZnfD8DNC1ypfcuHt5krjMWYyTy R14qmAlpNXdBrvUzxOAU6E7rNqXFDa/nqhLHyu6+SWJvnCwj+mVeGdIzI dSqqLbgO+xHWhvmznSF3UNv2va30sauCjMQ7pKipn2BEGQz+oE5OVj//B YPglObh6nvM6erO3InZEOFy91O3zNixXXsDioaaE3IPd5K8PF4DaxRs97 A==; X-IronPort-AV: E=McAfee;i="6600,9927,10992"; a="3036709" X-IronPort-AV: E=Sophos;i="6.06,179,1705392000"; d="scan'208";a="3036709" Received: from fmviesa001.fm.intel.com ([10.60.135.141]) by fmvoesa109.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Feb 2024 12:34:25 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.06,179,1705392000"; d="scan'208";a="36638986" Received: from lkp-server02.sh.intel.com (HELO 3c78fa4d504c) ([10.239.97.151]) by fmviesa001.fm.intel.com with ESMTP; 22 Feb 2024 12:34:23 -0800 Received: from kbuild by 3c78fa4d504c with local (Exim 4.96) (envelope-from ) id 1rdFlt-0006h2-04; Thu, 22 Feb 2024 20:34:21 +0000 Date: Fri, 23 Feb 2024 04:33:29 +0800 From: kernel test robot To: Ronnie Sahlberg Cc: oe-kbuild-all@lists.linux.dev, linux-kernel@vger.kernel.org, Steve French , "Paulo Alcantara (SUSE)" Subject: include/linux/fortify-string.h:586:17: error: call to '__write_overflow' declared with attribute error: detected write beyond size of object (1st parameter) Message-ID: <202402230419.nO2R7P95-lkp@intel.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Hi Ronnie, FYI, the error/warning still remains. tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master head: 39133352cbed6626956d38ed72012f49b0421e7b commit: 2f6f19c7aaad5005dc75298a413eb0243c5d312d cifs: fix regression in very old smb1 mounts date: 1 year, 4 months ago config: mips-allyesconfig (https://download.01.org/0day-ci/archive/20240223/202402230419.nO2R7P95-lkp@intel.com/config) compiler: mips-linux-gcc (GCC) 13.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240223/202402230419.nO2R7P95-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202402230419.nO2R7P95-lkp@intel.com/ All errors (new ones prefixed by >>): In file included from include/linux/string.h:253, from include/linux/bitmap.h:11, from include/linux/cpumask.h:12, from arch/mips/include/asm/processor.h:15, from arch/mips/include/asm/thread_info.h:16, from include/linux/thread_info.h:60, from include/asm-generic/preempt.h:5, from ./arch/mips/include/generated/asm/preempt.h:1, from include/linux/preempt.h:78, from include/linux/spinlock.h:56, from include/linux/wait.h:9, from include/linux/wait_bit.h:8, from include/linux/fs.h:6, from fs/cifs/connect.c:8: In function 'strcpy', inlined from 'CIFSTCon' at fs/cifs/connect.c:3949:3: >> include/linux/fortify-string.h:586:17: error: call to '__write_overflow' declared with attribute error: detected write beyond size of object (1st parameter) 586 | __write_overflow(); | ^~~~~~~~~~~~~~~~~~ vim +/__write_overflow +586 include/linux/fortify-string.h a28a6e860c6cf2 Francis Laniel 2021-02-25 569 f68f2ff91512c1 Kees Cook 2021-04-20 570 /* Defined after fortified strlen to reuse it. */ 92df138a8d663c Kees Cook 2022-02-08 571 __FORTIFY_INLINE __diagnose_as(__builtin_strcpy, 1, 2) 281d0c962752fb Kees Cook 2022-02-08 572 char *strcpy(char * const POS p, const char * const POS q) a28a6e860c6cf2 Francis Laniel 2021-02-25 573 { 9f7d69c5cd2390 Kees Cook 2022-09-19 574 size_t p_size = __member_size(p); 9f7d69c5cd2390 Kees Cook 2022-09-19 575 size_t q_size = __member_size(q); a28a6e860c6cf2 Francis Laniel 2021-02-25 576 size_t size; a28a6e860c6cf2 Francis Laniel 2021-02-25 577 f68f2ff91512c1 Kees Cook 2021-04-20 578 /* If neither buffer size is known, immediately give up. */ fa35198f39571b Kees Cook 2022-09-19 579 if (__builtin_constant_p(p_size) && fa35198f39571b Kees Cook 2022-09-19 580 __builtin_constant_p(q_size) && fa35198f39571b Kees Cook 2022-09-19 581 p_size == SIZE_MAX && q_size == SIZE_MAX) a28a6e860c6cf2 Francis Laniel 2021-02-25 582 return __underlying_strcpy(p, q); a28a6e860c6cf2 Francis Laniel 2021-02-25 583 size = strlen(q) + 1; 072af0c638dc8a Kees Cook 2021-08-02 584 /* Compile-time check for const size overflow. */ fa35198f39571b Kees Cook 2022-09-19 585 if (__compiletime_lessthan(p_size, size)) 072af0c638dc8a Kees Cook 2021-08-02 @586 __write_overflow(); 072af0c638dc8a Kees Cook 2021-08-02 587 /* Run-time check for dynamic size overflow. */ a28a6e860c6cf2 Francis Laniel 2021-02-25 588 if (p_size < size) a28a6e860c6cf2 Francis Laniel 2021-02-25 589 fortify_panic(__func__); f68f2ff91512c1 Kees Cook 2021-04-20 590 __underlying_memcpy(p, q, size); a28a6e860c6cf2 Francis Laniel 2021-02-25 591 return p; a28a6e860c6cf2 Francis Laniel 2021-02-25 592 } a28a6e860c6cf2 Francis Laniel 2021-02-25 593 :::::: The code at line 586 was first introduced by commit :::::: 072af0c638dc8a5c7db2edc4dddbd6d44bee3bdb fortify: Fix dropped strcpy() compile-time write overflow check :::::: TO: Kees Cook :::::: CC: Kees Cook -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki