[Bug 1114566] New: Warnings during kernel build
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566 Bug ID: 1114566 Summary: Warnings during kernel build Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: x86-64 OS: openSUSE Factory Status: NEW Severity: Normal Priority: P5 - None Component: Kernel Assignee: kernel-maintainers@forge.provo.novell.com Reporter: tjcw@cantab.net QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- I am doing a kernel build with CONFIG_SLUB set. I see the following warnings: CC kernel/debug/kdb/kdb_io.o kernel/debug/kdb/kdb_io.c: In function ‘kdb_getstr’: kernel/debug/kdb/kdb_io.c:446:3: warning: ‘strncpy’ specified bound 256 equals destination size [-Wstringop-truncation] strncpy(kdb_prompt_str, prompt, CMD_BUFLEN); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ CC kernel/debug/kdb/kdb_main.o In function ‘handle_ctrl_cmd’, inlined from ‘kdb_local.isra.6’ at kernel/debug/kdb/kdb_main.c:1323:10, inlined from ‘kdb_main_loop’ at kernel/debug/kdb/kdb_main.c:1422:12: kernel/debug/kdb/kdb_main.c:1106:3: warning: ‘strncpy’ specified bound 200 equals destination size [-Wstringop-truncation] strncpy(cmd_cur, cmd_hist[cmdptr], CMD_BUFLEN); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ kernel/debug/kdb/kdb_main.c:1111:3: warning: ‘strncpy’ specified bound 200 equals destination size [-Wstringop-truncation] strncpy(cmd_cur, cmd_hist[cmdptr], CMD_BUFLEN); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ CC kernel/debug/kdb/kdb_support.o kernel/debug/kdb/kdb_support.c: In function ‘kallsyms_symbol_next’: kernel/debug/kdb/kdb_support.c:239:4: warning: ‘strncpy’ specified bound depends on the length of the source argument [-Wstringop-overflow=] strncpy(prefix_name, name, strlen(name)+1); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ kernel/debug/kdb/kdb_support.c:239:31: note: length computed here strncpy(prefix_name, name, strlen(name)+1); ^~~~~~~~~~~~ which I think are about potential buffer overflows, nothing to do with the config option I have changed. They should be fixed, or fed upstream for fixing at kernel.org . -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566#c1
--- Comment #1 from Chris Ward
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566#c2
--- Comment #2 from Chris Ward
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566#c3
--- Comment #3 from Chris Ward
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566#c4
--- Comment #4 from Chris Ward
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566#c5
--- Comment #5 from Chris Ward
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566#c6
--- Comment #6 from Chris Ward
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566#c7
--- Comment #7 from Chris Ward
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566#c8
--- Comment #8 from Chris Ward
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566#c10
--- Comment #10 from Chris Ward
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566#c11
--- Comment #11 from Takashi Iwai
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566#c12
--- Comment #12 from Takashi Iwai
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566#c13
--- Comment #13 from Takashi Iwai
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566
http://bugzilla.opensuse.org/show_bug.cgi?id=1114566#c14
Chris Ward
participants (1)
-
bugzilla_noreply@novell.com