lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <163228551953.26896.13635500020872473940.b4-ty@oracle.com>
Date:   Wed, 22 Sep 2021 00:44:44 -0400
From:   "Martin K. Petersen" <martin.petersen@...cle.com>
To:     "James E.J. Bottomley" <jejb@...ux.ibm.com>,
        Dick Kennedy <dick.kennedy@...adcom.com>,
        Arnd Bergmann <arnd@...nel.org>,
        James Smart <james.smart@...adcom.com>,
        Justin Tee <justin.tee@...adcom.com>,
        Arnd Bergmann <arnd@...db.de>
Cc:     "Martin K . Petersen" <martin.petersen@...cle.com>,
        Lee Jones <lee.jones@...aro.org>,
        Gaurav Srivastava <gaurav.srivastava@...adcom.com>,
        linux-kernel@...r.kernel.org, linux-scsi@...r.kernel.org
Subject: Re: [PATCH] scsi: lpfc: Fix gcc -Wstringop-overread warning, again

On Mon, 20 Sep 2021 11:56:22 +0200, Arnd Bergmann wrote:

> From: Arnd Bergmann <arnd@...db.de>
> 
> I fixed a stringop-overread warning earlier this year, now a
> second copy of the original code was added and the warning came
> back:
> 
> drivers/scsi/lpfc/lpfc_attr.c: In function 'lpfc_cmf_info_show':
> drivers/scsi/lpfc/lpfc_attr.c:289:25: error: 'strnlen' specified bound 4095 exceeds source size 24 [-Werror=stringop-overread]
>   289 |                         strnlen(LPFC_INFO_MORE_STR, PAGE_SIZE - 1),
>       |                         ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> 
> [...]

Applied to 5.15/scsi-fixes, thanks!

[1/1] scsi: lpfc: Fix gcc -Wstringop-overread warning, again
      https://git.kernel.org/mkp/scsi/c/a38923f2d088

-- 
Martin K. Petersen	Oracle Linux Engineering

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ