lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CA+G9fYtNbgy7C0bFhsptk9HfE-kxPf+gEpviL4=o1YePoY8xSw@mail.gmail.com>
Date: Wed, 21 Feb 2024 21:02:33 +0530
From: Naresh Kamboju <naresh.kamboju@...aro.org>
To: open list <linux-kernel@...r.kernel.org>, Netdev <netdev@...r.kernel.org>, 
	lkft-triage@...ts.linaro.org
Cc: Kees Cook <keescook@...omium.org>, Arnd Bergmann <arnd@...db.de>, Hao Luo <haoluo@...gle.com>, 
	Miguel Ojeda <ojeda@...nel.org>, Nathan Chancellor <nathan@...nel.org>, 
	Peter Zijlstra <peterz@...radead.org>, Justin Stitt <justinstitt@...gle.com>
Subject: x86: fortify-string.h:63:33: error: '__builtin_memcmp' specified
 bound exceeds maximum object size

The x86 / i386 compilations encountered errors due to additional Kconfigs
incorporated from the selftests/net/*/config in the Linux next version.
The issue first appeared with the next-20240213 tag. This problem affects
the Linux next branch, but not the mainline Linus master branch.

Reported-by: Linux Kernel Functional Testing <lkft@...aro.org>

The bisection points to the following commit id,
# first bad commit: [64259ce2a20ce2dcc585a2cb83d1366fb04a6008] ubsan:
reintroduce signed overflow sanitizer

Build errors:
-------------
In function 'memcmp',
    inlined from 'nft_pipapo_insert' at
/builds/linux/net/netfilter/nft_set_pipapo.c:1258:7:
/builds/linux/include/linux/fortify-string.h:63:33: error:
'__builtin_memcmp' specified bound 18446744071562067968 exceeds
maximum object size 9223372036854775807 [-Werror=stringop-overread]
   63 | #define __underlying_memcmp     __builtin_memcmp
      |                                 ^
/builds/linux/include/linux/fortify-string.h:655:16: note: in
expansion of macro '__underlying_memcmp'
  655 |         return __underlying_memcmp(p, q, size);
      |                ^~~~~~~~~~~~~~~~~~~
cc1: all warnings being treated as errors

Steps to reproduce:
-----
tuxmake --runtime podman --target-arch x86_64 --toolchain gcc-13 \
 --kconfig https://storage.tuxsuite.com/public/linaro/lkft/builds/2cfazKeUY5ZIZx7MgVwRAYSVe4w/config
\
 debugkernel cpupower headers kernel kselftest modules

config link:
 - https://storage.tuxsuite.com/public/linaro/lkft/builds/2cfazKeUY5ZIZx7MgVwRAYSVe4w/config
 - https://storage.tuxsuite.com/public/linaro/lkft/builds/2cfazKeUY5ZIZx7MgVwRAYSVe4w/

--
Linaro LKFT
https://lkft.linaro.org

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ