From: Arnd Bergmann <arnd@kernel.org> To: linux-kernel@vger.kernel.org, Martin Sebor <msebor@gcc.gnu.org>, Serge Hallyn <serge@hallyn.com>, James Morris <jmorris@namei.org> Cc: Arnd Bergmann <arnd@arndb.de>, x86@kernel.org, Ning Sun <ning.sun@intel.com>, Jani Nikula <jani.nikula@linux.intel.com>, Kalle Valo <kvalo@codeaurora.org>, Simon Kelley <simon@thekelleys.org.uk>, James Smart <james.smart@broadcom.com>, "James E.J. Bottomley" <jejb@linux.ibm.com>, Anders Larsen <al@alarsen.net>, Tejun Heo <tj@kernel.org>, Imre Deak <imre.deak@intel.com>, linux-arm-kernel@lists.infradead.org, tboot-devel@lists.sourceforge.net, intel-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, ath11k@lists.infradead.org, linux-wireless@vger.kernel.org, netdev@vger.kernel.org, linux-scsi@vger.kernel.org, cgroups@vger.kernel.org, linux-security-module@vger.kernel.org, "Eric W. Biederman" <ebiederm@xmission.com>, Christian Brauner <christian.brauner@ubuntu.com>, Kees Cook <keescook@chromium.org>, Miklos Szeredi <mszeredi@redhat.com>, Tycho Andersen <tycho@tycho.pizza> Subject: [PATCH 03/11] security: commoncap: fix -Wstringop-overread warning Date: Mon, 22 Mar 2021 17:02:41 +0100 [thread overview] Message-ID: <20210322160253.4032422-4-arnd@kernel.org> (raw) In-Reply-To: <20210322160253.4032422-1-arnd@kernel.org> From: Arnd Bergmann <arnd@arndb.de> gcc-11 introdces a harmless warning for cap_inode_getsecurity: security/commoncap.c: In function ‘cap_inode_getsecurity’: security/commoncap.c:440:33: error: ‘memcpy’ reading 16 bytes from a region of size 0 [-Werror=stringop-overread] 440 | memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The problem here is that tmpbuf is initialized to NULL, so gcc assumes it is not accessible unless it gets set by vfs_getxattr_alloc(). This is a legitimate warning as far as I can tell, but the code is correct since it correctly handles the error when that function fails. Add a separate NULL check to tell gcc about it as well. Signed-off-by: Arnd Bergmann <arnd@arndb.de> --- security/commoncap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/security/commoncap.c b/security/commoncap.c index 28f4d25480df..9a36ed6dd737 100644 --- a/security/commoncap.c +++ b/security/commoncap.c @@ -400,7 +400,7 @@ int cap_inode_getsecurity(struct user_namespace *mnt_userns, &tmpbuf, size, GFP_NOFS); dput(dentry); - if (ret < 0) + if (ret < 0 || !tmpbuf) return ret; fs_ns = inode->i_sb->s_user_ns; -- 2.29.2
WARNING: multiple messages have this Message-ID
From: Arnd Bergmann <arnd@kernel.org> To: linux-kernel@vger.kernel.org, Martin Sebor <msebor@gcc.gnu.org>, Serge Hallyn <serge@hallyn.com>, James Morris <jmorris@namei.org> Cc: Arnd Bergmann <arnd@arndb.de>, x86@kernel.org, Ning Sun <ning.sun@intel.com>, Jani Nikula <jani.nikula@linux.intel.com>, Kalle Valo <kvalo@codeaurora.org>, Simon Kelley <simon@thekelleys.org.uk>, James Smart <james.smart@broadcom.com>, "James E.J. Bottomley" <jejb@linux.ibm.com>, Anders Larsen <al@alarsen.net>, Tejun Heo <tj@kernel.org>, Imre Deak <imre.deak@intel.com>, linux-arm-kernel@lists.infradead.org, tboot-devel@lists.sourceforge.net, intel-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, ath11k@lists.infradead.org, linux-wireless@vger.kernel.org, netdev@vger.kernel.org, linux-scsi@vger.kernel.org, cgroups@vger.kernel.org, linux-security-module@vger.kernel.org, "Eric W. Biederman" <ebiederm@xmission.com>, Christian Brauner <christian.brauner@ubuntu.com>, Kees Cook <keescook@chromium.org>, Miklos Szeredi <mszeredi@redhat.com>, Tycho Andersen <tycho@tycho.pizza> Subject: [PATCH 03/11] security: commoncap: fix -Wstringop-overread warning Date: Mon, 22 Mar 2021 17:02:41 +0100 [thread overview] Message-ID: <20210322160253.4032422-4-arnd@kernel.org> (raw) In-Reply-To: <20210322160253.4032422-1-arnd@kernel.org> From: Arnd Bergmann <arnd@arndb.de> gcc-11 introdces a harmless warning for cap_inode_getsecurity: security/commoncap.c: In function ‘cap_inode_getsecurity’: security/commoncap.c:440:33: error: ‘memcpy’ reading 16 bytes from a region of size 0 [-Werror=stringop-overread] 440 | memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The problem here is that tmpbuf is initialized to NULL, so gcc assumes it is not accessible unless it gets set by vfs_getxattr_alloc(). This is a legitimate warning as far as I can tell, but the code is correct since it correctly handles the error when that function fails. Add a separate NULL check to tell gcc about it as well. Signed-off-by: Arnd Bergmann <arnd@arndb.de> --- security/commoncap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/security/commoncap.c b/security/commoncap.c index 28f4d25480df..9a36ed6dd737 100644 --- a/security/commoncap.c +++ b/security/commoncap.c @@ -400,7 +400,7 @@ int cap_inode_getsecurity(struct user_namespace *mnt_userns, &tmpbuf, size, GFP_NOFS); dput(dentry); - if (ret < 0) + if (ret < 0 || !tmpbuf) return ret; fs_ns = inode->i_sb->s_user_ns; -- 2.29.2 -- ath11k mailing list ath11k@lists.infradead.org http://lists.infradead.org/mailman/listinfo/ath11k
WARNING: multiple messages have this Message-ID
From: Arnd Bergmann <arnd@kernel.org> To: linux-kernel@vger.kernel.org, Martin Sebor <msebor@gcc.gnu.org>, Serge Hallyn <serge@hallyn.com>, James Morris <jmorris@namei.org> Cc: Arnd Bergmann <arnd@arndb.de>, x86@kernel.org, Ning Sun <ning.sun@intel.com>, Jani Nikula <jani.nikula@linux.intel.com>, Kalle Valo <kvalo@codeaurora.org>, Simon Kelley <simon@thekelleys.org.uk>, James Smart <james.smart@broadcom.com>, "James E.J. Bottomley" <jejb@linux.ibm.com>, Anders Larsen <al@alarsen.net>, Tejun Heo <tj@kernel.org>, Imre Deak <imre.deak@intel.com>, linux-arm-kernel@lists.infradead.org, tboot-devel@lists.sourceforge.net, intel-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, ath11k@lists.infradead.org, linux-wireless@vger.kernel.org, netdev@vger.kernel.org, linux-scsi@vger.kernel.org, cgroups@vger.kernel.org, linux-security-module@vger.kernel.org, "Eric W. Biederman" <ebiederm@xmission.com>, Christian Brauner <christian.brauner@ubuntu.com>, Kees Cook <keescook@chromium.org>, Miklos Szeredi <mszeredi@redhat.com>, Tycho Andersen <tycho@tycho.pizza> Subject: [PATCH 03/11] security: commoncap: fix -Wstringop-overread warning Date: Mon, 22 Mar 2021 17:02:41 +0100 [thread overview] Message-ID: <20210322160253.4032422-4-arnd@kernel.org> (raw) In-Reply-To: <20210322160253.4032422-1-arnd@kernel.org> From: Arnd Bergmann <arnd@arndb.de> gcc-11 introdces a harmless warning for cap_inode_getsecurity: security/commoncap.c: In function ‘cap_inode_getsecurity’: security/commoncap.c:440:33: error: ‘memcpy’ reading 16 bytes from a region of size 0 [-Werror=stringop-overread] 440 | memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The problem here is that tmpbuf is initialized to NULL, so gcc assumes it is not accessible unless it gets set by vfs_getxattr_alloc(). This is a legitimate warning as far as I can tell, but the code is correct since it correctly handles the error when that function fails. Add a separate NULL check to tell gcc about it as well. Signed-off-by: Arnd Bergmann <arnd@arndb.de> --- security/commoncap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/security/commoncap.c b/security/commoncap.c index 28f4d25480df..9a36ed6dd737 100644 --- a/security/commoncap.c +++ b/security/commoncap.c @@ -400,7 +400,7 @@ int cap_inode_getsecurity(struct user_namespace *mnt_userns, &tmpbuf, size, GFP_NOFS); dput(dentry); - if (ret < 0) + if (ret < 0 || !tmpbuf) return ret; fs_ns = inode->i_sb->s_user_ns; -- 2.29.2 _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
WARNING: multiple messages have this Message-ID
From: Arnd Bergmann <arnd@kernel.org> To: linux-kernel@vger.kernel.org, Martin Sebor <msebor@gcc.gnu.org>, Serge Hallyn <serge@hallyn.com>, James Morris <jmorris@namei.org> Cc: dri-devel@lists.freedesktop.org, Christian Brauner <christian.brauner@ubuntu.com>, linux-scsi@vger.kernel.org, x86@kernel.org, James Smart <james.smart@broadcom.com>, tboot-devel@lists.sourceforge.net, Kalle Valo <kvalo@codeaurora.org>, ath11k@lists.infradead.org, Miklos Szeredi <mszeredi@redhat.com>, Kees Cook <keescook@chromium.org>, Arnd Bergmann <arnd@arndb.de>, "James E.J. Bottomley" <jejb@linux.ibm.com>, Ning Sun <ning.sun@intel.com>, Anders Larsen <al@alarsen.net>, cgroups@vger.kernel.org, linux-arm-kernel@lists.infradead.org, netdev@vger.kernel.org, linux-wireless@vger.kernel.org, linux-security-module@vger.kernel.org, "Eric W. Biederman" <ebiederm@xmission.com>, Tejun Heo <tj@kernel.org>, Simon Kelley <simon@thekelleys.org.uk>, intel-gfx@lists.freedesktop.org, Tycho Andersen <tycho@tycho.pizza> Subject: [PATCH 03/11] security: commoncap: fix -Wstringop-overread warning Date: Mon, 22 Mar 2021 17:02:41 +0100 [thread overview] Message-ID: <20210322160253.4032422-4-arnd@kernel.org> (raw) In-Reply-To: <20210322160253.4032422-1-arnd@kernel.org> From: Arnd Bergmann <arnd@arndb.de> gcc-11 introdces a harmless warning for cap_inode_getsecurity: security/commoncap.c: In function ‘cap_inode_getsecurity’: security/commoncap.c:440:33: error: ‘memcpy’ reading 16 bytes from a region of size 0 [-Werror=stringop-overread] 440 | memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The problem here is that tmpbuf is initialized to NULL, so gcc assumes it is not accessible unless it gets set by vfs_getxattr_alloc(). This is a legitimate warning as far as I can tell, but the code is correct since it correctly handles the error when that function fails. Add a separate NULL check to tell gcc about it as well. Signed-off-by: Arnd Bergmann <arnd@arndb.de> --- security/commoncap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/security/commoncap.c b/security/commoncap.c index 28f4d25480df..9a36ed6dd737 100644 --- a/security/commoncap.c +++ b/security/commoncap.c @@ -400,7 +400,7 @@ int cap_inode_getsecurity(struct user_namespace *mnt_userns, &tmpbuf, size, GFP_NOFS); dput(dentry); - if (ret < 0) + if (ret < 0 || !tmpbuf) return ret; fs_ns = inode->i_sb->s_user_ns; -- 2.29.2 _______________________________________________ dri-devel mailing list dri-devel@lists.freedesktop.org https://lists.freedesktop.org/mailman/listinfo/dri-devel
WARNING: multiple messages have this Message-ID
From: Arnd Bergmann <arnd@kernel.org> To: linux-kernel@vger.kernel.org, Martin Sebor <msebor@gcc.gnu.org>, Serge Hallyn <serge@hallyn.com>, James Morris <jmorris@namei.org> Cc: dri-devel@lists.freedesktop.org, Christian Brauner <christian.brauner@ubuntu.com>, linux-scsi@vger.kernel.org, x86@kernel.org, James Smart <james.smart@broadcom.com>, tboot-devel@lists.sourceforge.net, Kalle Valo <kvalo@codeaurora.org>, ath11k@lists.infradead.org, Miklos Szeredi <mszeredi@redhat.com>, Kees Cook <keescook@chromium.org>, Arnd Bergmann <arnd@arndb.de>, "James E.J. Bottomley" <jejb@linux.ibm.com>, Ning Sun <ning.sun@intel.com>, Anders Larsen <al@alarsen.net>, cgroups@vger.kernel.org, linux-arm-kernel@lists.infradead.org, netdev@vger.kernel.org, linux-wireless@vger.kernel.org, linux-security-module@vger.kernel.org, "Eric W. Biederman" <ebiederm@xmission.com>, Tejun Heo <tj@kernel.org>, Simon Kelley <simon@thekelleys.org.uk>, intel-gfx@lists.freedesktop.org, Tycho Andersen <tycho@tycho.pizza> Subject: [Intel-gfx] [PATCH 03/11] security: commoncap: fix -Wstringop-overread warning Date: Mon, 22 Mar 2021 17:02:41 +0100 [thread overview] Message-ID: <20210322160253.4032422-4-arnd@kernel.org> (raw) In-Reply-To: <20210322160253.4032422-1-arnd@kernel.org> From: Arnd Bergmann <arnd@arndb.de> gcc-11 introdces a harmless warning for cap_inode_getsecurity: security/commoncap.c: In function ‘cap_inode_getsecurity’: security/commoncap.c:440:33: error: ‘memcpy’ reading 16 bytes from a region of size 0 [-Werror=stringop-overread] 440 | memcpy(&nscap->data, &cap->data, sizeof(__le32) * 2 * VFS_CAP_U32); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The problem here is that tmpbuf is initialized to NULL, so gcc assumes it is not accessible unless it gets set by vfs_getxattr_alloc(). This is a legitimate warning as far as I can tell, but the code is correct since it correctly handles the error when that function fails. Add a separate NULL check to tell gcc about it as well. Signed-off-by: Arnd Bergmann <arnd@arndb.de> --- security/commoncap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/security/commoncap.c b/security/commoncap.c index 28f4d25480df..9a36ed6dd737 100644 --- a/security/commoncap.c +++ b/security/commoncap.c @@ -400,7 +400,7 @@ int cap_inode_getsecurity(struct user_namespace *mnt_userns, &tmpbuf, size, GFP_NOFS); dput(dentry); - if (ret < 0) + if (ret < 0 || !tmpbuf) return ret; fs_ns = inode->i_sb->s_user_ns; -- 2.29.2 _______________________________________________ Intel-gfx mailing list Intel-gfx@lists.freedesktop.org https://lists.freedesktop.org/mailman/listinfo/intel-gfx
next prev parent reply other threads:[~2021-03-22 16:08 UTC|newest] Thread overview: 167+ messages / expand[flat|nested] mbox.gz Atom feed top 2021-03-22 16:02 [PATCH 00/11] treewide: address gcc-11 -Wstringop-overread warnings Arnd Bergmann 2021-03-22 16:02 ` [Intel-gfx] " Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` [PATCH 01/11] x86: compressed: avoid gcc-11 -Wstringop-overread warning Arnd Bergmann 2021-03-22 16:02 ` [Intel-gfx] " Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 23:30 ` [tip: x86/boot] x86/boot/compressed: Avoid " tip-bot2 for Arnd Bergmann 2021-03-22 16:02 ` [PATCH 02/11] x86: tboot: avoid Wstringop-overread-warning Arnd Bergmann 2021-03-22 16:02 ` [Intel-gfx] " Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 20:29 ` Ingo Molnar 2021-03-22 20:29 ` [Intel-gfx] " Ingo Molnar 2021-03-22 20:29 ` Ingo Molnar 2021-03-22 20:29 ` Ingo Molnar 2021-03-22 20:29 ` Ingo Molnar 2021-03-22 21:39 ` Arnd Bergmann 2021-03-22 21:39 ` [Intel-gfx] " Arnd Bergmann 2021-03-22 21:39 ` Arnd Bergmann 2021-03-22 21:39 ` Arnd Bergmann 2021-03-22 21:39 ` Arnd Bergmann 2021-03-22 22:07 ` Martin Sebor 2021-03-22 22:07 ` [Intel-gfx] " Martin Sebor 2021-03-22 22:07 ` Martin Sebor 2021-03-22 22:07 ` Martin Sebor 2021-03-22 22:07 ` Martin Sebor 2021-03-22 22:49 ` Arnd Bergmann 2021-03-22 22:49 ` [Intel-gfx] " Arnd Bergmann 2021-03-22 22:49 ` Arnd Bergmann 2021-03-22 22:49 ` Arnd Bergmann 2021-03-22 22:49 ` Arnd Bergmann 2021-03-22 23:13 ` Ingo Molnar 2021-03-22 23:13 ` [Intel-gfx] " Ingo Molnar 2021-03-22 23:13 ` Ingo Molnar 2021-03-22 23:13 ` Ingo Molnar 2021-03-22 23:13 ` Ingo Molnar 2021-03-24 9:11 ` David Laight 2021-03-24 9:11 ` [Intel-gfx] " David Laight 2021-03-24 9:11 ` David Laight 2021-03-24 9:11 ` David Laight 2021-03-24 9:11 ` David Laight 2021-03-24 10:39 ` David Laight 2021-03-24 10:39 ` [Intel-gfx] " David Laight 2021-03-24 10:39 ` David Laight 2021-03-24 10:39 ` David Laight 2021-03-24 10:39 ` David Laight 2021-03-22 23:30 ` [tip: x86/boot] x86/boot/tboot: Avoid Wstringop-overread-warning tip-bot2 for Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann [this message] 2021-03-22 16:02 ` [Intel-gfx] [PATCH 03/11] security: commoncap: fix -Wstringop-overread warning Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:31 ` Christian Brauner 2021-03-22 16:31 ` [Intel-gfx] " Christian Brauner 2021-03-22 16:31 ` Christian Brauner 2021-03-22 16:31 ` Christian Brauner 2021-03-22 16:31 ` Christian Brauner 2021-03-24 20:50 ` James Morris 2021-03-24 20:50 ` [Intel-gfx] " James Morris 2021-03-24 20:50 ` James Morris 2021-03-24 20:50 ` James Morris 2021-03-24 20:50 ` James Morris 2021-03-22 16:02 ` [PATCH 04/11] ath11: Wstringop-overread warning Arnd Bergmann 2021-03-22 16:02 ` [Intel-gfx] " Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-09-28 9:04 ` Kalle Valo 2021-09-28 9:04 ` Kalle Valo 2021-09-28 9:04 ` Kalle Valo 2021-09-28 9:04 ` [Intel-gfx] " Kalle Valo 2021-03-22 16:02 ` [PATCH 05/11] qnx: avoid -Wstringop-overread warning Arnd Bergmann 2021-03-22 16:02 ` [Intel-gfx] " Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` [PATCH 06/11] cgroup: fix -Wzero-length-bounds warnings Arnd Bergmann 2021-03-22 16:02 ` [Intel-gfx] " Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-30 8:41 ` Michal Koutný 2021-03-30 8:41 ` [Intel-gfx] " Michal Koutný 2021-03-30 8:41 ` Michal Koutný 2021-03-30 8:41 ` Michal Koutný 2021-03-30 8:41 ` Michal Koutný 2021-03-30 9:00 ` Arnd Bergmann 2021-03-30 9:00 ` [Intel-gfx] " Arnd Bergmann 2021-03-30 9:00 ` Arnd Bergmann 2021-03-30 9:00 ` Arnd Bergmann 2021-03-30 9:00 ` Arnd Bergmann 2021-03-30 14:44 ` Michal Koutný 2021-03-30 14:44 ` [Intel-gfx] " Michal Koutný 2021-03-30 14:44 ` Michal Koutný 2021-03-30 14:44 ` Michal Koutný 2021-03-30 14:44 ` Michal Koutný 2021-03-22 16:02 ` [PATCH 07/11] ARM: sharpsl_param: work around -Wstringop-overread warning Arnd Bergmann 2021-03-22 16:02 ` [Intel-gfx] " Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` [PATCH 08/11] atmel: avoid gcc -Wstringop-overflow warning Arnd Bergmann 2021-03-22 16:02 ` [Intel-gfx] " Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` [PATCH 09/11] scsi: lpfc: fix gcc -Wstringop-overread warning Arnd Bergmann 2021-03-22 16:02 ` [Intel-gfx] " Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` [PATCH 10/11] drm/i915: avoid stringop-overread warning on pri_latency Arnd Bergmann 2021-03-22 16:02 ` [Intel-gfx] " Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-24 15:30 ` Jani Nikula 2021-03-24 15:30 ` [Intel-gfx] " Jani Nikula 2021-03-24 15:30 ` Jani Nikula 2021-03-24 15:30 ` Jani Nikula 2021-03-24 15:30 ` Jani Nikula 2021-03-24 17:22 ` Ville Syrjälä 2021-03-24 17:22 ` [Intel-gfx] " Ville Syrjälä 2021-03-24 17:22 ` Ville Syrjälä 2021-03-24 17:22 ` Ville Syrjälä 2021-03-24 17:22 ` Ville Syrjälä 2021-03-22 16:02 ` [PATCH 11/11] [RFC] drm/i915/dp: fix array overflow warning Arnd Bergmann 2021-03-22 16:02 ` [Intel-gfx] " Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-22 16:02 ` Arnd Bergmann 2021-03-25 8:05 ` Jani Nikula 2021-03-25 8:05 ` [Intel-gfx] " Jani Nikula 2021-03-25 8:05 ` Jani Nikula 2021-03-25 8:05 ` Jani Nikula 2021-03-25 8:05 ` Jani Nikula 2021-03-25 9:53 ` Arnd Bergmann 2021-03-25 9:53 ` [Intel-gfx] " Arnd Bergmann 2021-03-25 9:53 ` Arnd Bergmann 2021-03-25 9:53 ` Arnd Bergmann 2021-03-25 9:53 ` Arnd Bergmann 2021-03-25 14:49 ` Martin Sebor 2021-03-25 14:49 ` [Intel-gfx] " Martin Sebor 2021-03-25 14:49 ` Martin Sebor 2021-03-25 14:49 ` Martin Sebor 2021-03-25 14:49 ` Martin Sebor 2021-03-30 10:56 ` Hans de Goede 2021-03-30 10:56 ` [Intel-gfx] " Hans de Goede 2021-03-30 10:56 ` Hans de Goede 2021-03-30 10:56 ` Hans de Goede 2021-03-30 10:56 ` Hans de Goede 2021-03-22 19:10 ` [Intel-gfx] ✗ Fi.CI.CHECKPATCH: warning for treewide: address gcc-11 -Wstringop-overread warnings Patchwork 2021-03-22 19:12 ` [Intel-gfx] ✗ Fi.CI.SPARSE: " Patchwork 2021-03-22 19:38 ` [Intel-gfx] ✓ Fi.CI.BAT: success " Patchwork 2021-03-23 15:30 ` [Intel-gfx] ✗ Fi.CI.BUILD: failure for treewide: address gcc-11 -Wstringop-overread warnings (rev2) Patchwork 2021-03-25 22:35 ` [Intel-gfx] ✗ Fi.CI.BUILD: failure for treewide: address gcc-11 -Wstringop-overread warnings (rev3) Patchwork 2021-03-30 11:50 ` [Intel-gfx] ✗ Fi.CI.BUILD: failure for treewide: address gcc-11 -Wstringop-overread warnings (rev4) Patchwork 2021-04-06 4:53 ` [PATCH 00/11] treewide: address gcc-11 -Wstringop-overread warnings Martin K. Petersen 2021-04-06 4:53 ` [Intel-gfx] " Martin K. Petersen 2021-04-06 4:53 ` Martin K. Petersen 2021-04-06 4:53 ` Martin K. Petersen 2021-04-06 4:53 ` Martin K. Petersen
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20210322160253.4032422-4-arnd@kernel.org \ --to=arnd@kernel.org \ --cc=al@alarsen.net \ --cc=arnd@arndb.de \ --cc=ath11k@lists.infradead.org \ --cc=cgroups@vger.kernel.org \ --cc=christian.brauner@ubuntu.com \ --cc=dri-devel@lists.freedesktop.org \ --cc=ebiederm@xmission.com \ --cc=imre.deak@intel.com \ --cc=intel-gfx@lists.freedesktop.org \ --cc=james.smart@broadcom.com \ --cc=jani.nikula@linux.intel.com \ --cc=jejb@linux.ibm.com \ --cc=jmorris@namei.org \ --cc=keescook@chromium.org \ --cc=kvalo@codeaurora.org \ --cc=linux-arm-kernel@lists.infradead.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-scsi@vger.kernel.org \ --cc=linux-security-module@vger.kernel.org \ --cc=linux-wireless@vger.kernel.org \ --cc=msebor@gcc.gnu.org \ --cc=mszeredi@redhat.com \ --cc=netdev@vger.kernel.org \ --cc=ning.sun@intel.com \ --cc=serge@hallyn.com \ --cc=simon@thekelleys.org.uk \ --cc=tboot-devel@lists.sourceforge.net \ --cc=tj@kernel.org \ --cc=tycho@tycho.pizza \ --cc=x86@kernel.org \ --subject='Re: [PATCH 03/11] security: commoncap: fix -Wstringop-overread warning' \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.