lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <27b7c058-dc68-b2e9-3151-d362dd5fbfae@gmx.de>
Date:   Thu, 20 May 2021 23:30:17 +0200
From:   Ronald Warsow <rwarsow@....de>
To:     stable@...r.kernel.org
Cc:     linux-kernel@...r.kernel.org
Subject: Re: [PATCH 5.12 00/43] 5.12.6-rc2 review

hello

apart from one warning all seems fine here with 5.12.6-rc2

thanks


...
                  from arch/x86/kernel/tboot.c:9:
In function ‘memcmp’,
     inlined from ‘tboot_probe’ at arch/x86/kernel/tboot.c:70:6:
./include/linux/fortify-string.h:19:33: warning: ‘__builtin_memcmp_eq’
specified bound 16 exceeds source size 0 [-Wstringop-overread]
    19 | #define __underlying_memcmp     __builtin_memcmp
       |                                 ^
./include/linux/fortify-string.h:235:16: note: in expansion of macro
‘__underlying_memcmp’
   235 |         return __underlying_memcmp(p, q, size);
       |                ^~~~~~~~~~~~~~~~~~~
   CC      kernel/module.o
..


--
regards

Ronald

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ