[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <85de69eb-5d71-4b29-ba83-c0258d58b807@app.fastmail.com>
Date: Tue, 14 Feb 2023 22:53:14 +0100
From: "Arnd Bergmann" <arnd@...nel.org>
To: "Kees Cook" <keescook@...omium.org>
Cc: "Brian King" <brking@...ibm.com>,
"James E.J. Bottomley" <jejb@...ux.ibm.com>,
"Martin K. Petersen" <martin.petersen@...cle.com>,
"Nathan Chancellor" <nathan@...nel.org>,
"Nick Desaulniers" <ndesaulniers@...gle.com>,
"James Bottomley" <James.Bottomley@...eleye.com>,
"Damien Le Moal" <damien.lemoal@...nsource.wdc.com>,
"Arnd Bergmann" <arnd@...db.de>,
"Niklas Cassel" <niklas.cassel@....com>,
"John Garry" <john.g.garry@...cle.com>, linux-scsi@...r.kernel.org,
linux-kernel@...r.kernel.org, llvm@...ts.linux.dev
Subject: Re: [PATCH] [v2] scsi: ipr: work around fortify-string warning
On Tue, Feb 14, 2023, at 22:49, Kees Cook wrote:
> On Tue, Feb 14, 2023 at 02:28:08PM +0100, Arnd Bergmann wrote:
>> From: Arnd Bergmann <arnd@...db.de>
>>
>> The ipr_log_vpd_compact() function triggers a fortified memcpy() warning
>> about a potential string overflow with all versions of clang:
>
> Perhaps this is arch or config specific? I haven't been able to reproduce
> this for some reason.
I saw it on three arm32 randconfig builds out
of a few thousand, with clang-15, clang-16 and
clang-17. See [1] for one config that triggered
it with recent linux-next based tree.
Arnd
[1] https://pastebin.com/c9FEjzKe
Powered by blists - more mailing lists