All of lore.kernel.org
 help / color / mirror / Atom feed
From: kernel test robot <lkp@intel.com>
To: Kees Cook <keescook@chromium.org>
Cc: llvm@lists.linux.dev, kbuild-all@lists.01.org,
	linux-kernel@vger.kernel.org
Subject: [kees:for-next/memcpy 9/9] include/linux/fortify-string.h:324:4: warning: call to __read_overflow2_field declared with 'warning' attribute: detected read beyond size of field (2nd parameter); maybe use struct_group()?
Date: Tue, 25 Jan 2022 18:12:24 +0800	[thread overview]
Message-ID: <202201251831.4t5TPp18-lkp@intel.com> (raw)

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git for-next/memcpy
head:   6303361147fc8984dd259b54c189592cd0551ab6
commit: 6303361147fc8984dd259b54c189592cd0551ab6 [9/9] fortify: Work around Clang inlining bugs
config: arm-randconfig-c002-20220124 (https://download.01.org/0day-ci/archive/20220125/202201251831.4t5TPp18-lkp@intel.com/config)
compiler: clang version 14.0.0 (https://github.com/llvm/llvm-project 997e128e2a78f5a5434fc75997441ae1ee76f8a4)
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # install arm cross compiling tool for clang build
        # apt-get install binutils-arm-linux-gnueabi
        # https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git/commit/?id=6303361147fc8984dd259b54c189592cd0551ab6
        git remote add kees https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git
        git fetch --no-tags kees for-next/memcpy
        git checkout 6303361147fc8984dd259b54c189592cd0551ab6
        # save the config file to linux build tree
        mkdir build_dir
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=arm SHELL=/bin/bash drivers/net/wireless/ath/ath9k/

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>

All warnings (new ones prefixed by >>):

   In file included from drivers/net/wireless/ath/ath9k/xmit.c:17:
   In file included from include/linux/dma-mapping.h:6:
   In file included from include/linux/string.h:253:
>> include/linux/fortify-string.h:324:4: warning: call to __read_overflow2_field declared with 'warning' attribute: detected read beyond size of field (2nd parameter); maybe use struct_group()? [-Wattribute-warning]
                           __read_overflow2_field(q_size_field, size);
                           ^
>> include/linux/fortify-string.h:324:4: warning: call to __read_overflow2_field declared with 'warning' attribute: detected read beyond size of field (2nd parameter); maybe use struct_group()? [-Wattribute-warning]
   2 warnings generated.


vim +/warning +324 include/linux/fortify-string.h

6f6f253efa1346 Kees Cook      2021-06-16  255  
6f6f253efa1346 Kees Cook      2021-06-16  256  /*
6f6f253efa1346 Kees Cook      2021-06-16  257   * __builtin_object_size() must be captured here to avoid evaluating argument
6f6f253efa1346 Kees Cook      2021-06-16  258   * side-effects further into the macro layers.
6f6f253efa1346 Kees Cook      2021-06-16  259   */
6f6f253efa1346 Kees Cook      2021-06-16  260  #define memset(p, c, s) __fortify_memset_chk(p, c, s,			\
6f6f253efa1346 Kees Cook      2021-06-16  261  		__builtin_object_size(p, 0), __builtin_object_size(p, 1))
a28a6e860c6cf2 Francis Laniel 2021-02-25  262  
602670289b69b2 Kees Cook      2021-04-20  263  /*
602670289b69b2 Kees Cook      2021-04-20  264   * To make sure the compiler can enforce protection against buffer overflows,
602670289b69b2 Kees Cook      2021-04-20  265   * memcpy(), memmove(), and memset() must not be used beyond individual
602670289b69b2 Kees Cook      2021-04-20  266   * struct members. If you need to copy across multiple members, please use
602670289b69b2 Kees Cook      2021-04-20  267   * struct_group() to create a named mirror of an anonymous struct union.
602670289b69b2 Kees Cook      2021-04-20  268   * (e.g. see struct sk_buff.)
602670289b69b2 Kees Cook      2021-04-20  269   *
602670289b69b2 Kees Cook      2021-04-20  270   * Mitigation coverage
602670289b69b2 Kees Cook      2021-04-20  271   *					Bounds checking at:
602670289b69b2 Kees Cook      2021-04-20  272   *					+-------+-------+-------+-------+
602670289b69b2 Kees Cook      2021-04-20  273   *					| Compile time  | Run time      |
602670289b69b2 Kees Cook      2021-04-20  274   * memcpy() argument sizes:		| write | read  | write | read  |
602670289b69b2 Kees Cook      2021-04-20  275   *					+-------+-------+-------+-------+
602670289b69b2 Kees Cook      2021-04-20  276   * memcpy(known,   known,   constant)	|   y   |   y   |  n/a  |  n/a  |
602670289b69b2 Kees Cook      2021-04-20  277   * memcpy(unknown, known,   constant)	|   n   |   y   |   V   |  n/a  |
602670289b69b2 Kees Cook      2021-04-20  278   * memcpy(known,   unknown, constant)	|   y   |   n   |  n/a  |   V   |
602670289b69b2 Kees Cook      2021-04-20  279   * memcpy(unknown, unknown, constant)	|   n   |   n   |   V   |   V   |
602670289b69b2 Kees Cook      2021-04-20  280   * memcpy(known,   known,   dynamic)	|   n   |   n   |   b   |   B   |
602670289b69b2 Kees Cook      2021-04-20  281   * memcpy(unknown, known,   dynamic)	|   n   |   n   |   V   |   B   |
602670289b69b2 Kees Cook      2021-04-20  282   * memcpy(known,   unknown, dynamic)	|   n   |   n   |   b   |   V   |
602670289b69b2 Kees Cook      2021-04-20  283   * memcpy(unknown, unknown, dynamic)	|   n   |   n   |   V   |   V   |
602670289b69b2 Kees Cook      2021-04-20  284   *					+-------+-------+-------+-------+
602670289b69b2 Kees Cook      2021-04-20  285   *
602670289b69b2 Kees Cook      2021-04-20  286   * y = deterministic compile-time bounds checking
602670289b69b2 Kees Cook      2021-04-20  287   * n = cannot do deterministic compile-time bounds checking
602670289b69b2 Kees Cook      2021-04-20  288   * n/a = no run-time bounds checking needed since compile-time deterministic
602670289b69b2 Kees Cook      2021-04-20  289   * b = perform run-time bounds checking
602670289b69b2 Kees Cook      2021-04-20  290   * B = can perform run-time bounds checking, but current unenforced
602670289b69b2 Kees Cook      2021-04-20  291   * V = vulnerable to run-time overflow
602670289b69b2 Kees Cook      2021-04-20  292   *
602670289b69b2 Kees Cook      2021-04-20  293   */
602670289b69b2 Kees Cook      2021-04-20  294  __FORTIFY_INLINE void fortify_memcpy_chk(__kernel_size_t size,
602670289b69b2 Kees Cook      2021-04-20  295  					 const size_t p_size,
602670289b69b2 Kees Cook      2021-04-20  296  					 const size_t q_size,
602670289b69b2 Kees Cook      2021-04-20  297  					 const size_t p_size_field,
602670289b69b2 Kees Cook      2021-04-20  298  					 const size_t q_size_field,
602670289b69b2 Kees Cook      2021-04-20  299  					 const char *func)
a28a6e860c6cf2 Francis Laniel 2021-02-25  300  {
a28a6e860c6cf2 Francis Laniel 2021-02-25  301  	if (__builtin_constant_p(size)) {
602670289b69b2 Kees Cook      2021-04-20  302  		/*
602670289b69b2 Kees Cook      2021-04-20  303  		 * Length argument is a constant expression, so we
602670289b69b2 Kees Cook      2021-04-20  304  		 * can perform compile-time bounds checking where
602670289b69b2 Kees Cook      2021-04-20  305  		 * buffer sizes are known.
602670289b69b2 Kees Cook      2021-04-20  306  		 */
602670289b69b2 Kees Cook      2021-04-20  307  
602670289b69b2 Kees Cook      2021-04-20  308  		/* Error when size is larger than enclosing struct. */
602670289b69b2 Kees Cook      2021-04-20  309  		if (p_size > p_size_field && p_size < size)
a28a6e860c6cf2 Francis Laniel 2021-02-25  310  			__write_overflow();
602670289b69b2 Kees Cook      2021-04-20  311  		if (q_size > q_size_field && q_size < size)
a28a6e860c6cf2 Francis Laniel 2021-02-25  312  			__read_overflow2();
602670289b69b2 Kees Cook      2021-04-20  313  
602670289b69b2 Kees Cook      2021-04-20  314  		/* Warn when write size argument larger than dest field. */
602670289b69b2 Kees Cook      2021-04-20  315  		if (p_size_field < size)
602670289b69b2 Kees Cook      2021-04-20  316  			__write_overflow_field(p_size_field, size);
602670289b69b2 Kees Cook      2021-04-20  317  		/*
602670289b69b2 Kees Cook      2021-04-20  318  		 * Warn for source field over-read when building with W=1
602670289b69b2 Kees Cook      2021-04-20  319  		 * or when an over-write happened, so both can be fixed at
602670289b69b2 Kees Cook      2021-04-20  320  		 * the same time.
602670289b69b2 Kees Cook      2021-04-20  321  		 */
602670289b69b2 Kees Cook      2021-04-20  322  		if ((IS_ENABLED(KBUILD_EXTRA_WARN1) || p_size_field < size) &&
602670289b69b2 Kees Cook      2021-04-20  323  		    q_size_field < size)
602670289b69b2 Kees Cook      2021-04-20 @324  			__read_overflow2_field(q_size_field, size);
a28a6e860c6cf2 Francis Laniel 2021-02-25  325  	}
602670289b69b2 Kees Cook      2021-04-20  326  	/*
602670289b69b2 Kees Cook      2021-04-20  327  	 * At this point, length argument may not be a constant expression,
602670289b69b2 Kees Cook      2021-04-20  328  	 * so run-time bounds checking can be done where buffer sizes are
602670289b69b2 Kees Cook      2021-04-20  329  	 * known. (This is not an "else" because the above checks may only
602670289b69b2 Kees Cook      2021-04-20  330  	 * be compile-time warnings, and we want to still warn for run-time
602670289b69b2 Kees Cook      2021-04-20  331  	 * overflows.)
602670289b69b2 Kees Cook      2021-04-20  332  	 */
602670289b69b2 Kees Cook      2021-04-20  333  
602670289b69b2 Kees Cook      2021-04-20  334  	/*
602670289b69b2 Kees Cook      2021-04-20  335  	 * Always stop accesses beyond the struct that contains the
602670289b69b2 Kees Cook      2021-04-20  336  	 * field, when the buffer's remaining size is known.
602670289b69b2 Kees Cook      2021-04-20  337  	 * (The -1 test is to optimize away checks where the buffer
602670289b69b2 Kees Cook      2021-04-20  338  	 * lengths are unknown.)
602670289b69b2 Kees Cook      2021-04-20  339  	 */
602670289b69b2 Kees Cook      2021-04-20  340  	if ((p_size != (size_t)(-1) && p_size < size) ||
602670289b69b2 Kees Cook      2021-04-20  341  	    (q_size != (size_t)(-1) && q_size < size))
602670289b69b2 Kees Cook      2021-04-20  342  		fortify_panic(func);
a28a6e860c6cf2 Francis Laniel 2021-02-25  343  }
a28a6e860c6cf2 Francis Laniel 2021-02-25  344  

:::::: The code at line 324 was first introduced by commit
:::::: 602670289b69b2fded3a0b2240c4877e3a015ac6 fortify: Detect struct member overflows in memcpy() at compile-time

:::::: TO: Kees Cook <keescook@chromium.org>
:::::: CC: Kees Cook <keescook@chromium.org>

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

WARNING: multiple messages have this Message-ID (diff)
From: kernel test robot <lkp@intel.com>
To: kbuild-all@lists.01.org
Subject: [kees:for-next/memcpy 9/9] include/linux/fortify-string.h:324:4: warning: call to __read_overflow2_field declared with 'warning' attribute: detected read beyond size of field (2nd parameter); maybe use struct_group()?
Date: Tue, 25 Jan 2022 18:12:24 +0800	[thread overview]
Message-ID: <202201251831.4t5TPp18-lkp@intel.com> (raw)

[-- Attachment #1: Type: text/plain, Size: 10413 bytes --]

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git for-next/memcpy
head:   6303361147fc8984dd259b54c189592cd0551ab6
commit: 6303361147fc8984dd259b54c189592cd0551ab6 [9/9] fortify: Work around Clang inlining bugs
config: arm-randconfig-c002-20220124 (https://download.01.org/0day-ci/archive/20220125/202201251831.4t5TPp18-lkp(a)intel.com/config)
compiler: clang version 14.0.0 (https://github.com/llvm/llvm-project 997e128e2a78f5a5434fc75997441ae1ee76f8a4)
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # install arm cross compiling tool for clang build
        # apt-get install binutils-arm-linux-gnueabi
        # https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git/commit/?id=6303361147fc8984dd259b54c189592cd0551ab6
        git remote add kees https://git.kernel.org/pub/scm/linux/kernel/git/kees/linux.git
        git fetch --no-tags kees for-next/memcpy
        git checkout 6303361147fc8984dd259b54c189592cd0551ab6
        # save the config file to linux build tree
        mkdir build_dir
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=arm SHELL=/bin/bash drivers/net/wireless/ath/ath9k/

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>

All warnings (new ones prefixed by >>):

   In file included from drivers/net/wireless/ath/ath9k/xmit.c:17:
   In file included from include/linux/dma-mapping.h:6:
   In file included from include/linux/string.h:253:
>> include/linux/fortify-string.h:324:4: warning: call to __read_overflow2_field declared with 'warning' attribute: detected read beyond size of field (2nd parameter); maybe use struct_group()? [-Wattribute-warning]
                           __read_overflow2_field(q_size_field, size);
                           ^
>> include/linux/fortify-string.h:324:4: warning: call to __read_overflow2_field declared with 'warning' attribute: detected read beyond size of field (2nd parameter); maybe use struct_group()? [-Wattribute-warning]
   2 warnings generated.


vim +/warning +324 include/linux/fortify-string.h

6f6f253efa1346 Kees Cook      2021-06-16  255  
6f6f253efa1346 Kees Cook      2021-06-16  256  /*
6f6f253efa1346 Kees Cook      2021-06-16  257   * __builtin_object_size() must be captured here to avoid evaluating argument
6f6f253efa1346 Kees Cook      2021-06-16  258   * side-effects further into the macro layers.
6f6f253efa1346 Kees Cook      2021-06-16  259   */
6f6f253efa1346 Kees Cook      2021-06-16  260  #define memset(p, c, s) __fortify_memset_chk(p, c, s,			\
6f6f253efa1346 Kees Cook      2021-06-16  261  		__builtin_object_size(p, 0), __builtin_object_size(p, 1))
a28a6e860c6cf2 Francis Laniel 2021-02-25  262  
602670289b69b2 Kees Cook      2021-04-20  263  /*
602670289b69b2 Kees Cook      2021-04-20  264   * To make sure the compiler can enforce protection against buffer overflows,
602670289b69b2 Kees Cook      2021-04-20  265   * memcpy(), memmove(), and memset() must not be used beyond individual
602670289b69b2 Kees Cook      2021-04-20  266   * struct members. If you need to copy across multiple members, please use
602670289b69b2 Kees Cook      2021-04-20  267   * struct_group() to create a named mirror of an anonymous struct union.
602670289b69b2 Kees Cook      2021-04-20  268   * (e.g. see struct sk_buff.)
602670289b69b2 Kees Cook      2021-04-20  269   *
602670289b69b2 Kees Cook      2021-04-20  270   * Mitigation coverage
602670289b69b2 Kees Cook      2021-04-20  271   *					Bounds checking at:
602670289b69b2 Kees Cook      2021-04-20  272   *					+-------+-------+-------+-------+
602670289b69b2 Kees Cook      2021-04-20  273   *					| Compile time  | Run time      |
602670289b69b2 Kees Cook      2021-04-20  274   * memcpy() argument sizes:		| write | read  | write | read  |
602670289b69b2 Kees Cook      2021-04-20  275   *					+-------+-------+-------+-------+
602670289b69b2 Kees Cook      2021-04-20  276   * memcpy(known,   known,   constant)	|   y   |   y   |  n/a  |  n/a  |
602670289b69b2 Kees Cook      2021-04-20  277   * memcpy(unknown, known,   constant)	|   n   |   y   |   V   |  n/a  |
602670289b69b2 Kees Cook      2021-04-20  278   * memcpy(known,   unknown, constant)	|   y   |   n   |  n/a  |   V   |
602670289b69b2 Kees Cook      2021-04-20  279   * memcpy(unknown, unknown, constant)	|   n   |   n   |   V   |   V   |
602670289b69b2 Kees Cook      2021-04-20  280   * memcpy(known,   known,   dynamic)	|   n   |   n   |   b   |   B   |
602670289b69b2 Kees Cook      2021-04-20  281   * memcpy(unknown, known,   dynamic)	|   n   |   n   |   V   |   B   |
602670289b69b2 Kees Cook      2021-04-20  282   * memcpy(known,   unknown, dynamic)	|   n   |   n   |   b   |   V   |
602670289b69b2 Kees Cook      2021-04-20  283   * memcpy(unknown, unknown, dynamic)	|   n   |   n   |   V   |   V   |
602670289b69b2 Kees Cook      2021-04-20  284   *					+-------+-------+-------+-------+
602670289b69b2 Kees Cook      2021-04-20  285   *
602670289b69b2 Kees Cook      2021-04-20  286   * y = deterministic compile-time bounds checking
602670289b69b2 Kees Cook      2021-04-20  287   * n = cannot do deterministic compile-time bounds checking
602670289b69b2 Kees Cook      2021-04-20  288   * n/a = no run-time bounds checking needed since compile-time deterministic
602670289b69b2 Kees Cook      2021-04-20  289   * b = perform run-time bounds checking
602670289b69b2 Kees Cook      2021-04-20  290   * B = can perform run-time bounds checking, but current unenforced
602670289b69b2 Kees Cook      2021-04-20  291   * V = vulnerable to run-time overflow
602670289b69b2 Kees Cook      2021-04-20  292   *
602670289b69b2 Kees Cook      2021-04-20  293   */
602670289b69b2 Kees Cook      2021-04-20  294  __FORTIFY_INLINE void fortify_memcpy_chk(__kernel_size_t size,
602670289b69b2 Kees Cook      2021-04-20  295  					 const size_t p_size,
602670289b69b2 Kees Cook      2021-04-20  296  					 const size_t q_size,
602670289b69b2 Kees Cook      2021-04-20  297  					 const size_t p_size_field,
602670289b69b2 Kees Cook      2021-04-20  298  					 const size_t q_size_field,
602670289b69b2 Kees Cook      2021-04-20  299  					 const char *func)
a28a6e860c6cf2 Francis Laniel 2021-02-25  300  {
a28a6e860c6cf2 Francis Laniel 2021-02-25  301  	if (__builtin_constant_p(size)) {
602670289b69b2 Kees Cook      2021-04-20  302  		/*
602670289b69b2 Kees Cook      2021-04-20  303  		 * Length argument is a constant expression, so we
602670289b69b2 Kees Cook      2021-04-20  304  		 * can perform compile-time bounds checking where
602670289b69b2 Kees Cook      2021-04-20  305  		 * buffer sizes are known.
602670289b69b2 Kees Cook      2021-04-20  306  		 */
602670289b69b2 Kees Cook      2021-04-20  307  
602670289b69b2 Kees Cook      2021-04-20  308  		/* Error when size is larger than enclosing struct. */
602670289b69b2 Kees Cook      2021-04-20  309  		if (p_size > p_size_field && p_size < size)
a28a6e860c6cf2 Francis Laniel 2021-02-25  310  			__write_overflow();
602670289b69b2 Kees Cook      2021-04-20  311  		if (q_size > q_size_field && q_size < size)
a28a6e860c6cf2 Francis Laniel 2021-02-25  312  			__read_overflow2();
602670289b69b2 Kees Cook      2021-04-20  313  
602670289b69b2 Kees Cook      2021-04-20  314  		/* Warn when write size argument larger than dest field. */
602670289b69b2 Kees Cook      2021-04-20  315  		if (p_size_field < size)
602670289b69b2 Kees Cook      2021-04-20  316  			__write_overflow_field(p_size_field, size);
602670289b69b2 Kees Cook      2021-04-20  317  		/*
602670289b69b2 Kees Cook      2021-04-20  318  		 * Warn for source field over-read when building with W=1
602670289b69b2 Kees Cook      2021-04-20  319  		 * or when an over-write happened, so both can be fixed at
602670289b69b2 Kees Cook      2021-04-20  320  		 * the same time.
602670289b69b2 Kees Cook      2021-04-20  321  		 */
602670289b69b2 Kees Cook      2021-04-20  322  		if ((IS_ENABLED(KBUILD_EXTRA_WARN1) || p_size_field < size) &&
602670289b69b2 Kees Cook      2021-04-20  323  		    q_size_field < size)
602670289b69b2 Kees Cook      2021-04-20 @324  			__read_overflow2_field(q_size_field, size);
a28a6e860c6cf2 Francis Laniel 2021-02-25  325  	}
602670289b69b2 Kees Cook      2021-04-20  326  	/*
602670289b69b2 Kees Cook      2021-04-20  327  	 * At this point, length argument may not be a constant expression,
602670289b69b2 Kees Cook      2021-04-20  328  	 * so run-time bounds checking can be done where buffer sizes are
602670289b69b2 Kees Cook      2021-04-20  329  	 * known. (This is not an "else" because the above checks may only
602670289b69b2 Kees Cook      2021-04-20  330  	 * be compile-time warnings, and we want to still warn for run-time
602670289b69b2 Kees Cook      2021-04-20  331  	 * overflows.)
602670289b69b2 Kees Cook      2021-04-20  332  	 */
602670289b69b2 Kees Cook      2021-04-20  333  
602670289b69b2 Kees Cook      2021-04-20  334  	/*
602670289b69b2 Kees Cook      2021-04-20  335  	 * Always stop accesses beyond the struct that contains the
602670289b69b2 Kees Cook      2021-04-20  336  	 * field, when the buffer's remaining size is known.
602670289b69b2 Kees Cook      2021-04-20  337  	 * (The -1 test is to optimize away checks where the buffer
602670289b69b2 Kees Cook      2021-04-20  338  	 * lengths are unknown.)
602670289b69b2 Kees Cook      2021-04-20  339  	 */
602670289b69b2 Kees Cook      2021-04-20  340  	if ((p_size != (size_t)(-1) && p_size < size) ||
602670289b69b2 Kees Cook      2021-04-20  341  	    (q_size != (size_t)(-1) && q_size < size))
602670289b69b2 Kees Cook      2021-04-20  342  		fortify_panic(func);
a28a6e860c6cf2 Francis Laniel 2021-02-25  343  }
a28a6e860c6cf2 Francis Laniel 2021-02-25  344  

:::::: The code at line 324 was first introduced by commit
:::::: 602670289b69b2fded3a0b2240c4877e3a015ac6 fortify: Detect struct member overflows in memcpy()@compile-time

:::::: TO: Kees Cook <keescook@chromium.org>
:::::: CC: Kees Cook <keescook@chromium.org>

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org

             reply	other threads:[~2022-01-25 10:12 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-01-25 10:12 kernel test robot [this message]
2022-01-25 10:12 ` [kees:for-next/memcpy 9/9] include/linux/fortify-string.h:324:4: warning: call to __read_overflow2_field declared with 'warning' attribute: detected read beyond size of field (2nd parameter); maybe use struct_group()? kernel test robot

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=202201251831.4t5TPp18-lkp@intel.com \
    --to=lkp@intel.com \
    --cc=kbuild-all@lists.01.org \
    --cc=keescook@chromium.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=llvm@lists.linux.dev \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.