Re: [PATCH] acl: Annotate struct posix_acl with __counted_by()

2024-09-25 Thread kernel test robot
Hello, kernel test robot noticed "WARNING:at_lib/string_helpers.c:#__fortify_report" on: commit: 3d2d832826325210abb9849ee96634bf5a197517 ("[PATCH] acl: Annotate struct posix_acl with __counted_by()") url: https://github.com/intel-lab-lkp/linux/commits/Thorsten-Blum/acl-Annotate-struct-posi

Re: [REGRESSION][BISECTED] Cannot boot Lichee Pi 4A with FORTIFY_SOURCE enabled

2024-09-25 Thread Jason Montleon
On Tue, Sep 24, 2024 at 1:36 PM Kees Cook wrote: > > > > On September 24, 2024 8:58:57 AM PDT, Jason Montleon > wrote: > >On Sun, Sep 22, 2024 at 6:38 PM Kees Cook wrote: > >> Can you try this patch? It should avoid using the "WARN" infrastructure > >> (if that is the source of blocking boot),

Re: [RFC PATCH 00/11] output a valid shell script when running 'make -n'

2024-09-25 Thread Vegard Nossum
Hi, I didn't receive a single comment on this patch series since I submitted it a month ago, but I understand it's been busy with conferences and the merge window. I've rebased it on latest mainline (including the kbuild-6.12 merge) and there's just one tiny trivial conflict. Can/should I wait

[PATCH v2] ksmbd: Annotate struct copychunk_ioctl_req with __counted_by_le()

2024-09-25 Thread Thorsten Blum
Add the __counted_by_le compiler attribute to the flexible array member Chunks to improve access bounds-checking via CONFIG_UBSAN_BOUNDS and CONFIG_FORTIFY_SOURCE. Change the data type of the flexible array member Chunks from __u8[] to struct srv_copychunk[] for ChunkCount to match the number of e

Re: [PATCH] acl: Annotate struct posix_acl with __counted_by()

2024-09-25 Thread Christian Brauner
On Mon, 23 Sep 2024 23:38:05 +0200, Thorsten Blum wrote: > Add the __counted_by compiler attribute to the flexible array member > a_entries to improve access bounds-checking via CONFIG_UBSAN_BOUNDS and > CONFIG_FORTIFY_SOURCE. > > Use struct_size() to calculate the number of bytes to allocate for