lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202312241346.T8Nf06n1-lkp@intel.com>
Date: Sun, 24 Dec 2023 13:16:31 +0800
From: kernel test robot <lkp@...el.com>
To: Mickaël Salaün <mic@...ux.microsoft.com>
Cc: oe-kbuild-all@...ts.linux.dev, linux-kernel@...r.kernel.org,
	James Morris <jamorris@...ux.microsoft.com>,
	Kees Cook <keescook@...omium.org>, Jann Horn <jannh@...gle.com>
Subject: arch/x86/include/asm/string_32.h:182:25: warning: '__builtin_memcpy'
 specified bound 4294967295 exceeds maximum object size 2147483647

Hi Mickaël,

FYI, the error/warning still remains.

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head:   861deac3b092f37b2c5e6871732f3e11486f7082
commit: ae271c1b14de343b888e77f74f640e3dcbdeb4c9 landlock: Add ruleset and domain management
date:   2 years, 8 months ago
config: i386-buildonly-randconfig-r002-20220101 (https://download.01.org/0day-ci/archive/20231224/202312241346.T8Nf06n1-lkp@intel.com/config)
compiler: gcc-12 (Debian 12.2.0-14) 12.2.0
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231224/202312241346.T8Nf06n1-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202312241346.T8Nf06n1-lkp@intel.com/

All warnings (new ones prefixed by >>):

   In file included from arch/x86/include/asm/string.h:3,
                    from include/linux/string.h:21,
                    from include/linux/bitmap.h:9,
                    from include/linux/cpumask.h:12,
                    from include/linux/smp.h:13,
                    from include/linux/lockdep.h:14,
                    from security/landlock/ruleset.c:15:
   security/landlock/ruleset.c: In function 'create_rule':
>> arch/x86/include/asm/string_32.h:182:25: warning: '__builtin_memcpy' specified bound 4294967295 exceeds maximum object size 2147483647 [-Wstringop-overflow=]
     182 | #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
         |                         ^~~~~~~~~~~~~~~~~~~~~~~~~
   security/landlock/ruleset.c:96:9: note: in expansion of macro 'memcpy'
      96 |         memcpy(new_rule->layers, layers,
         |         ^~~~~~


vim +/__builtin_memcpy +182 arch/x86/include/asm/string_32.h

^1da177e4c3f41 include/asm-i386/string.h        Linus Torvalds   2005-04-16  177  
^1da177e4c3f41 include/asm-i386/string.h        Linus Torvalds   2005-04-16  178  /*
^1da177e4c3f41 include/asm-i386/string.h        Linus Torvalds   2005-04-16  179   *	No 3D Now!
^1da177e4c3f41 include/asm-i386/string.h        Linus Torvalds   2005-04-16  180   */
^1da177e4c3f41 include/asm-i386/string.h        Linus Torvalds   2005-04-16  181  
ff60fab71bb3b4 arch/x86/include/asm/string_32.h Arjan van de Ven 2009-09-28 @182  #define memcpy(t, f, n) __builtin_memcpy(t, f, n)
^1da177e4c3f41 include/asm-i386/string.h        Linus Torvalds   2005-04-16  183  

:::::: The code at line 182 was first introduced by commit
:::::: ff60fab71bb3b4fdbf8caf57ff3739ffd0887396 x86: Use __builtin_memset and __builtin_memcpy for memset/memcpy

:::::: TO: Arjan van de Ven <arjan@...radead.org>
:::::: CC: H. Peter Anvin <hpa@...or.com>

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki

Powered by blists - more mailing lists