lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <E98E0D1B-4865-4177-A98F-8274B699E25E@chromium.org>
Date:   Mon, 30 Aug 2021 16:50:55 -0700
From:   Kees Cook <keescook@...omium.org>
To:     Stephen Rothwell <sfr@...b.auug.org.au>
CC:     "Gustavo A. R. Silva" <gustavoars@...nel.org>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Linux Next Mailing List <linux-next@...r.kernel.org>,
        Anitha Chrisanthus <anitha.chrisanthus@...el.com>,
        Sam Ravnborg <sam@...nborg.org>, edmund.j.dea@...el.com
Subject: Re: linux-next: build warning after merge of the kspp tree



On August 30, 2021 1:44:29 AM PDT, Stephen Rothwell <sfr@...b.auug.org.au> wrote:
>Hi all,
>
>After merging the kspp tree, today's linux-next build (powerpc
>allyesconfig) produced this warning:
>
>drivers/gpu/drm/kmb/kmb_plane.c:135:20: warning: array subscript 3 is above array bounds of 'struct layer_status[1]' [-Warray-bounds]
>  135 |   kmb->plane_status[plane_id].ctrl = LCD_CTRL_GL2_ENABLE;
>      |   ~~~~~~~~~~~~~~~~~^~~~~~~~~~
>In file included from drivers/gpu/drm/kmb/kmb_plane.c:17:
>drivers/gpu/drm/kmb/kmb_drv.h:48:23: note: while referencing 'plane_status'
>   48 |  struct layer_status  plane_status[KMB_MAX_PLANES];
>      |                       ^~~~~~~~~~~~

Hi!

Ah yes, thanks for the report. I encountered this too, and have been told the warning will go away soon:
https://lore.kernel.org/lkml/BY5PR11MB4182ABD607EB99C1F68777928CC69@BY5PR11MB4182.namprd11.prod.outlook.com/

-Kees

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ