All of lore.kernel.org
 help / color / mirror / Atom feed
* [linux-next:master 8362/9113] fs/cifs/smb1ops.c:279:16: warning: taking address of packed member 'smb_buf_length' of class or structure 'smb_hdr' may result in an unaligned pointer value
@ 2021-08-20  7:11 ` kernel test robot
  0 siblings, 0 replies; 2+ messages in thread
From: kernel test robot @ 2021-08-20  7:11 UTC (permalink / raw)
  To: Ronnie Sahlberg
  Cc: clang-built-linux, kbuild-all, Linux Memory Management List,
	Steve French

[-- Attachment #1: Type: text/plain, Size: 8598 bytes --]

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
head:   33e65b1f975cd2814fc0ea9617250fc4c1d7a553
commit: d3986619ac1ea40c4f4a988edd4d0c569ed5cd9c [8362/9113] cifs: move functions that depend on DES to smp1ops.c
config: i386-randconfig-r033-20210819 (attached as .config)
compiler: clang version 14.0.0 (https://github.com/llvm/llvm-project d9c5613e856cf2addfbf892fc4c1ce9ef9feceaa)
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=d3986619ac1ea40c4f4a988edd4d0c569ed5cd9c
        git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
        git fetch --no-tags linux-next master
        git checkout d3986619ac1ea40c4f4a988edd4d0c569ed5cd9c
        # save the attached .config to linux build tree
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=i386 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>

All warnings (new ones prefixed by >>):

   clang-14: warning: optimization flag '-falign-jumps=0' is not supported [-Wignored-optimization-argument]
   In file included from fs/cifs/smb1ops.c:10:
   In file included from include/linux/pagemap.h:8:
   In file included from include/linux/mm.h:10:
   In file included from include/linux/gfp.h:6:
   In file included from include/linux/mmzone.h:8:
   In file included from include/linux/spinlock.h:51:
   In file included from include/linux/preempt.h:78:
   In file included from arch/x86/include/asm/preempt.h:7:
   In file included from include/linux/thread_info.h:60:
   arch/x86/include/asm/thread_info.h:172:13: warning: calling '__builtin_frame_address' with a nonzero argument is unsafe [-Wframe-address]
           oldframe = __builtin_frame_address(1);
                      ^~~~~~~~~~~~~~~~~~~~~~~~~~
   arch/x86/include/asm/thread_info.h:174:11: warning: calling '__builtin_frame_address' with a nonzero argument is unsafe [-Wframe-address]
                   frame = __builtin_frame_address(2);
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~
>> fs/cifs/smb1ops.c:279:16: warning: taking address of packed member 'smb_buf_length' of class or structure 'smb_hdr' may result in an unaligned pointer value [-Waddress-of-packed-member]
           be32_add_cpu(&pSMB->hdr.smb_buf_length, count);
                         ^~~~~~~~~~~~~~~~~~~~~~~~
   3 warnings generated.


vim +279 fs/cifs/smb1ops.c

   177	
   178	/*
   179	 * Issue a TREE_CONNECT request.
   180	 */
   181	static int
   182	CIFSTCon(const unsigned int xid, struct cifs_ses *ses,
   183		 const char *tree, struct cifs_tcon *tcon,
   184		 const struct nls_table *nls_codepage)
   185	{
   186		struct smb_hdr *smb_buffer;
   187		struct smb_hdr *smb_buffer_response;
   188		TCONX_REQ *pSMB;
   189		TCONX_RSP *pSMBr;
   190		unsigned char *bcc_ptr;
   191		int rc = 0;
   192		int length;
   193		__u16 bytes_left, count;
   194	
   195		if (ses == NULL)
   196			return -EIO;
   197	
   198		smb_buffer = cifs_buf_get();
   199		if (smb_buffer == NULL)
   200			return -ENOMEM;
   201	
   202		smb_buffer_response = smb_buffer;
   203	
   204		header_assemble(smb_buffer, SMB_COM_TREE_CONNECT_ANDX,
   205				NULL /*no tid */ , 4 /*wct */ );
   206	
   207		smb_buffer->Mid = get_next_mid(ses->server);
   208		smb_buffer->Uid = ses->Suid;
   209		pSMB = (TCONX_REQ *) smb_buffer;
   210		pSMBr = (TCONX_RSP *) smb_buffer_response;
   211	
   212		pSMB->AndXCommand = 0xFF;
   213		pSMB->Flags = cpu_to_le16(TCON_EXTENDED_SECINFO);
   214		bcc_ptr = &pSMB->Password[0];
   215		if (tcon->pipe || (ses->server->sec_mode & SECMODE_USER)) {
   216			pSMB->PasswordLength = cpu_to_le16(1);	/* minimum */
   217			*bcc_ptr = 0; /* password is null byte */
   218			bcc_ptr++;              /* skip password */
   219			/* already aligned so no need to do it below */
   220		} else {
   221			pSMB->PasswordLength = cpu_to_le16(CIFS_AUTH_RESP_SIZE);
   222			/* BB FIXME add code to fail this if NTLMv2 or Kerberos
   223			   specified as required (when that support is added to
   224			   the vfs in the future) as only NTLM or the much
   225			   weaker LANMAN (which we do not send by default) is accepted
   226			   by Samba (not sure whether other servers allow
   227			   NTLMv2 password here) */
   228	#ifdef CONFIG_CIFS_WEAK_PW_HASH
   229			if ((global_secflags & CIFSSEC_MAY_LANMAN) &&
   230			    (ses->sectype == LANMAN))
   231				calc_lanman_hash(tcon->password, ses->server->cryptkey,
   232						 ses->server->sec_mode &
   233						    SECMODE_PW_ENCRYPT ? true : false,
   234						 bcc_ptr);
   235			else
   236	#endif /* CIFS_WEAK_PW_HASH */
   237			rc = SMBNTencrypt(tcon->password, ses->server->cryptkey,
   238						bcc_ptr, nls_codepage);
   239			if (rc) {
   240				cifs_dbg(FYI, "%s Can't generate NTLM rsp. Error: %d\n",
   241					 __func__, rc);
   242				cifs_buf_release(smb_buffer);
   243				return rc;
   244			}
   245	
   246			bcc_ptr += CIFS_AUTH_RESP_SIZE;
   247			if (ses->capabilities & CAP_UNICODE) {
   248				/* must align unicode strings */
   249				*bcc_ptr = 0; /* null byte password */
   250				bcc_ptr++;
   251			}
   252		}
   253	
   254		if (ses->server->sign)
   255			smb_buffer->Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
   256	
   257		if (ses->capabilities & CAP_STATUS32) {
   258			smb_buffer->Flags2 |= SMBFLG2_ERR_STATUS;
   259		}
   260		if (ses->capabilities & CAP_DFS) {
   261			smb_buffer->Flags2 |= SMBFLG2_DFS;
   262		}
   263		if (ses->capabilities & CAP_UNICODE) {
   264			smb_buffer->Flags2 |= SMBFLG2_UNICODE;
   265			length =
   266			    cifs_strtoUTF16((__le16 *) bcc_ptr, tree,
   267				6 /* max utf8 char length in bytes */ *
   268				(/* server len*/ + 256 /* share len */), nls_codepage);
   269			bcc_ptr += 2 * length;	/* convert num 16 bit words to bytes */
   270			bcc_ptr += 2;	/* skip trailing null */
   271		} else {		/* ASCII */
   272			strcpy(bcc_ptr, tree);
   273			bcc_ptr += strlen(tree) + 1;
   274		}
   275		strcpy(bcc_ptr, "?????");
   276		bcc_ptr += strlen("?????");
   277		bcc_ptr += 1;
   278		count = bcc_ptr - &pSMB->Password[0];
 > 279		be32_add_cpu(&pSMB->hdr.smb_buf_length, count);
   280		pSMB->ByteCount = cpu_to_le16(count);
   281	
   282		rc = SendReceive(xid, ses, smb_buffer, smb_buffer_response, &length,
   283				 0);
   284	
   285		/* above now done in SendReceive */
   286		if (rc == 0) {
   287			bool is_unicode;
   288	
   289			tcon->tidStatus = CifsGood;
   290			tcon->need_reconnect = false;
   291			tcon->tid = smb_buffer_response->Tid;
   292			bcc_ptr = pByteArea(smb_buffer_response);
   293			bytes_left = get_bcc(smb_buffer_response);
   294			length = strnlen(bcc_ptr, bytes_left - 2);
   295			if (smb_buffer->Flags2 & SMBFLG2_UNICODE)
   296				is_unicode = true;
   297			else
   298				is_unicode = false;
   299	
   300	
   301			/* skip service field (NB: this field is always ASCII) */
   302			if (length == 3) {
   303				if ((bcc_ptr[0] == 'I') && (bcc_ptr[1] == 'P') &&
   304				    (bcc_ptr[2] == 'C')) {
   305					cifs_dbg(FYI, "IPC connection\n");
   306					tcon->ipc = true;
   307					tcon->pipe = true;
   308				}
   309			} else if (length == 2) {
   310				if ((bcc_ptr[0] == 'A') && (bcc_ptr[1] == ':')) {
   311					/* the most common case */
   312					cifs_dbg(FYI, "disk share connection\n");
   313				}
   314			}
   315			bcc_ptr += length + 1;
   316			bytes_left -= (length + 1);
   317			strlcpy(tcon->treeName, tree, sizeof(tcon->treeName));
   318	
   319			/* mostly informational -- no need to fail on error here */
   320			kfree(tcon->nativeFileSystem);
   321			tcon->nativeFileSystem = cifs_strndup_from_utf16(bcc_ptr,
   322							      bytes_left, is_unicode,
   323							      nls_codepage);
   324	
   325			cifs_dbg(FYI, "nativeFileSystem=%s\n", tcon->nativeFileSystem);
   326	
   327			if ((smb_buffer_response->WordCount == 3) ||
   328				 (smb_buffer_response->WordCount == 7))
   329				/* field is in same location */
   330				tcon->Flags = le16_to_cpu(pSMBr->OptionalSupport);
   331			else
   332				tcon->Flags = 0;
   333			cifs_dbg(FYI, "Tcon flags: 0x%x\n", tcon->Flags);
   334		}
   335	
   336		cifs_buf_release(smb_buffer);
   337		return rc;
   338	}
   339	

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

[-- Attachment #2: .config.gz --]
[-- Type: application/gzip, Size: 34597 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

* [linux-next:master 8362/9113] fs/cifs/smb1ops.c:279:16: warning: taking address of packed member 'smb_buf_length' of class or structure 'smb_hdr' may result in an unaligned pointer value
@ 2021-08-20  7:11 ` kernel test robot
  0 siblings, 0 replies; 2+ messages in thread
From: kernel test robot @ 2021-08-20  7:11 UTC (permalink / raw)
  To: kbuild-all

[-- Attachment #1: Type: text/plain, Size: 8811 bytes --]

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
head:   33e65b1f975cd2814fc0ea9617250fc4c1d7a553
commit: d3986619ac1ea40c4f4a988edd4d0c569ed5cd9c [8362/9113] cifs: move functions that depend on DES to smp1ops.c
config: i386-randconfig-r033-20210819 (attached as .config)
compiler: clang version 14.0.0 (https://github.com/llvm/llvm-project d9c5613e856cf2addfbf892fc4c1ce9ef9feceaa)
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=d3986619ac1ea40c4f4a988edd4d0c569ed5cd9c
        git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
        git fetch --no-tags linux-next master
        git checkout d3986619ac1ea40c4f4a988edd4d0c569ed5cd9c
        # save the attached .config to linux build tree
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=i386 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>

All warnings (new ones prefixed by >>):

   clang-14: warning: optimization flag '-falign-jumps=0' is not supported [-Wignored-optimization-argument]
   In file included from fs/cifs/smb1ops.c:10:
   In file included from include/linux/pagemap.h:8:
   In file included from include/linux/mm.h:10:
   In file included from include/linux/gfp.h:6:
   In file included from include/linux/mmzone.h:8:
   In file included from include/linux/spinlock.h:51:
   In file included from include/linux/preempt.h:78:
   In file included from arch/x86/include/asm/preempt.h:7:
   In file included from include/linux/thread_info.h:60:
   arch/x86/include/asm/thread_info.h:172:13: warning: calling '__builtin_frame_address' with a nonzero argument is unsafe [-Wframe-address]
           oldframe = __builtin_frame_address(1);
                      ^~~~~~~~~~~~~~~~~~~~~~~~~~
   arch/x86/include/asm/thread_info.h:174:11: warning: calling '__builtin_frame_address' with a nonzero argument is unsafe [-Wframe-address]
                   frame = __builtin_frame_address(2);
                           ^~~~~~~~~~~~~~~~~~~~~~~~~~
>> fs/cifs/smb1ops.c:279:16: warning: taking address of packed member 'smb_buf_length' of class or structure 'smb_hdr' may result in an unaligned pointer value [-Waddress-of-packed-member]
           be32_add_cpu(&pSMB->hdr.smb_buf_length, count);
                         ^~~~~~~~~~~~~~~~~~~~~~~~
   3 warnings generated.


vim +279 fs/cifs/smb1ops.c

   177	
   178	/*
   179	 * Issue a TREE_CONNECT request.
   180	 */
   181	static int
   182	CIFSTCon(const unsigned int xid, struct cifs_ses *ses,
   183		 const char *tree, struct cifs_tcon *tcon,
   184		 const struct nls_table *nls_codepage)
   185	{
   186		struct smb_hdr *smb_buffer;
   187		struct smb_hdr *smb_buffer_response;
   188		TCONX_REQ *pSMB;
   189		TCONX_RSP *pSMBr;
   190		unsigned char *bcc_ptr;
   191		int rc = 0;
   192		int length;
   193		__u16 bytes_left, count;
   194	
   195		if (ses == NULL)
   196			return -EIO;
   197	
   198		smb_buffer = cifs_buf_get();
   199		if (smb_buffer == NULL)
   200			return -ENOMEM;
   201	
   202		smb_buffer_response = smb_buffer;
   203	
   204		header_assemble(smb_buffer, SMB_COM_TREE_CONNECT_ANDX,
   205				NULL /*no tid */ , 4 /*wct */ );
   206	
   207		smb_buffer->Mid = get_next_mid(ses->server);
   208		smb_buffer->Uid = ses->Suid;
   209		pSMB = (TCONX_REQ *) smb_buffer;
   210		pSMBr = (TCONX_RSP *) smb_buffer_response;
   211	
   212		pSMB->AndXCommand = 0xFF;
   213		pSMB->Flags = cpu_to_le16(TCON_EXTENDED_SECINFO);
   214		bcc_ptr = &pSMB->Password[0];
   215		if (tcon->pipe || (ses->server->sec_mode & SECMODE_USER)) {
   216			pSMB->PasswordLength = cpu_to_le16(1);	/* minimum */
   217			*bcc_ptr = 0; /* password is null byte */
   218			bcc_ptr++;              /* skip password */
   219			/* already aligned so no need to do it below */
   220		} else {
   221			pSMB->PasswordLength = cpu_to_le16(CIFS_AUTH_RESP_SIZE);
   222			/* BB FIXME add code to fail this if NTLMv2 or Kerberos
   223			   specified as required (when that support is added to
   224			   the vfs in the future) as only NTLM or the much
   225			   weaker LANMAN (which we do not send by default) is accepted
   226			   by Samba (not sure whether other servers allow
   227			   NTLMv2 password here) */
   228	#ifdef CONFIG_CIFS_WEAK_PW_HASH
   229			if ((global_secflags & CIFSSEC_MAY_LANMAN) &&
   230			    (ses->sectype == LANMAN))
   231				calc_lanman_hash(tcon->password, ses->server->cryptkey,
   232						 ses->server->sec_mode &
   233						    SECMODE_PW_ENCRYPT ? true : false,
   234						 bcc_ptr);
   235			else
   236	#endif /* CIFS_WEAK_PW_HASH */
   237			rc = SMBNTencrypt(tcon->password, ses->server->cryptkey,
   238						bcc_ptr, nls_codepage);
   239			if (rc) {
   240				cifs_dbg(FYI, "%s Can't generate NTLM rsp. Error: %d\n",
   241					 __func__, rc);
   242				cifs_buf_release(smb_buffer);
   243				return rc;
   244			}
   245	
   246			bcc_ptr += CIFS_AUTH_RESP_SIZE;
   247			if (ses->capabilities & CAP_UNICODE) {
   248				/* must align unicode strings */
   249				*bcc_ptr = 0; /* null byte password */
   250				bcc_ptr++;
   251			}
   252		}
   253	
   254		if (ses->server->sign)
   255			smb_buffer->Flags2 |= SMBFLG2_SECURITY_SIGNATURE;
   256	
   257		if (ses->capabilities & CAP_STATUS32) {
   258			smb_buffer->Flags2 |= SMBFLG2_ERR_STATUS;
   259		}
   260		if (ses->capabilities & CAP_DFS) {
   261			smb_buffer->Flags2 |= SMBFLG2_DFS;
   262		}
   263		if (ses->capabilities & CAP_UNICODE) {
   264			smb_buffer->Flags2 |= SMBFLG2_UNICODE;
   265			length =
   266			    cifs_strtoUTF16((__le16 *) bcc_ptr, tree,
   267				6 /* max utf8 char length in bytes */ *
   268				(/* server len*/ + 256 /* share len */), nls_codepage);
   269			bcc_ptr += 2 * length;	/* convert num 16 bit words to bytes */
   270			bcc_ptr += 2;	/* skip trailing null */
   271		} else {		/* ASCII */
   272			strcpy(bcc_ptr, tree);
   273			bcc_ptr += strlen(tree) + 1;
   274		}
   275		strcpy(bcc_ptr, "?????");
   276		bcc_ptr += strlen("?????");
   277		bcc_ptr += 1;
   278		count = bcc_ptr - &pSMB->Password[0];
 > 279		be32_add_cpu(&pSMB->hdr.smb_buf_length, count);
   280		pSMB->ByteCount = cpu_to_le16(count);
   281	
   282		rc = SendReceive(xid, ses, smb_buffer, smb_buffer_response, &length,
   283				 0);
   284	
   285		/* above now done in SendReceive */
   286		if (rc == 0) {
   287			bool is_unicode;
   288	
   289			tcon->tidStatus = CifsGood;
   290			tcon->need_reconnect = false;
   291			tcon->tid = smb_buffer_response->Tid;
   292			bcc_ptr = pByteArea(smb_buffer_response);
   293			bytes_left = get_bcc(smb_buffer_response);
   294			length = strnlen(bcc_ptr, bytes_left - 2);
   295			if (smb_buffer->Flags2 & SMBFLG2_UNICODE)
   296				is_unicode = true;
   297			else
   298				is_unicode = false;
   299	
   300	
   301			/* skip service field (NB: this field is always ASCII) */
   302			if (length == 3) {
   303				if ((bcc_ptr[0] == 'I') && (bcc_ptr[1] == 'P') &&
   304				    (bcc_ptr[2] == 'C')) {
   305					cifs_dbg(FYI, "IPC connection\n");
   306					tcon->ipc = true;
   307					tcon->pipe = true;
   308				}
   309			} else if (length == 2) {
   310				if ((bcc_ptr[0] == 'A') && (bcc_ptr[1] == ':')) {
   311					/* the most common case */
   312					cifs_dbg(FYI, "disk share connection\n");
   313				}
   314			}
   315			bcc_ptr += length + 1;
   316			bytes_left -= (length + 1);
   317			strlcpy(tcon->treeName, tree, sizeof(tcon->treeName));
   318	
   319			/* mostly informational -- no need to fail on error here */
   320			kfree(tcon->nativeFileSystem);
   321			tcon->nativeFileSystem = cifs_strndup_from_utf16(bcc_ptr,
   322							      bytes_left, is_unicode,
   323							      nls_codepage);
   324	
   325			cifs_dbg(FYI, "nativeFileSystem=%s\n", tcon->nativeFileSystem);
   326	
   327			if ((smb_buffer_response->WordCount == 3) ||
   328				 (smb_buffer_response->WordCount == 7))
   329				/* field is in same location */
   330				tcon->Flags = le16_to_cpu(pSMBr->OptionalSupport);
   331			else
   332				tcon->Flags = 0;
   333			cifs_dbg(FYI, "Tcon flags: 0x%x\n", tcon->Flags);
   334		}
   335	
   336		cifs_buf_release(smb_buffer);
   337		return rc;
   338	}
   339	

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org

[-- Attachment #2: config.gz --]
[-- Type: application/gzip, Size: 34597 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2021-08-20  7:12 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-08-20  7:11 [linux-next:master 8362/9113] fs/cifs/smb1ops.c:279:16: warning: taking address of packed member 'smb_buf_length' of class or structure 'smb_hdr' may result in an unaligned pointer value kernel test robot
2021-08-20  7:11 ` kernel test robot

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.