tree: https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git master head: 6be21d9878685e926d8e21fbfd8be7d0b6b105e4 commit: d70e44fef8621aeae895e1cbc62059df9e31836b [19/23] Bluetooth: Reject connection with the device which has same BD_ADDR config: arm-randconfig-001-20231005 (https://download.01.org/0day-ci/archive/20231005/202310050755.e0kabNON-lkp@xxxxxxxxx/config) compiler: arm-linux-gnueabi-gcc (GCC) 13.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231005/202310050755.e0kabNON-lkp@xxxxxxxxx/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp@xxxxxxxxx> | Closes: https://lore.kernel.org/oe-kbuild-all/202310050755.e0kabNON-lkp@xxxxxxxxx/ All warnings (new ones prefixed by >>): In file included from include/linux/string.h:254, from include/linux/bitmap.h:11, from include/linux/cpumask.h:12, from include/linux/smp.h:13, from include/linux/lockdep.h:14, from include/linux/spinlock.h:63, from include/linux/wait.h:9, from include/linux/poll.h:8, from include/net/bluetooth/bluetooth.h:29, from net/bluetooth/hci_event.c:30: net/bluetooth/hci_event.c: In function 'hci_cc_read_class_of_dev': include/linux/fortify-string.h:57:33: warning: '__builtin_memcpy' writing 3 bytes into a region of size 0 overflows the destination [-Wstringop-overflow=] 57 | #define __underlying_memcpy __builtin_memcpy | ^ include/linux/fortify-string.h:648:9: note: in expansion of macro '__underlying_memcpy' 648 | __underlying_##op(p, q, __fortify_size); \ | ^~~~~~~~~~~~~ include/linux/fortify-string.h:693:26: note: in expansion of macro '__fortify_memcpy_chk' 693 | #define memcpy(p, q, s) __fortify_memcpy_chk(p, q, s, \ | ^~~~~~~~~~~~~~~~~~~~ net/bluetooth/hci_event.c:522:9: note: in expansion of macro 'memcpy' 522 | memcpy(hdev->dev_class, rp->dev_class, 3); | ^~~~~~ cc1: note: destination object is likely at address zero In function 'memcmp', inlined from 'bacmp' at include/net/bluetooth/bluetooth.h:364:9, inlined from 'hci_conn_request_evt' at net/bluetooth/hci_event.c:3274:7: >> include/linux/fortify-string.h:63:33: warning: '__builtin_memcmp' specified bound 6 exceeds source size 0 [-Wstringop-overread] 63 | #define __underlying_memcmp __builtin_memcmp | ^ include/linux/fortify-string.h:728:16: note: in expansion of macro '__underlying_memcmp' 728 | return __underlying_memcmp(p, q, size); | ^~~~~~~~~~~~~~~~~~~ vim +/__builtin_memcmp +63 include/linux/fortify-string.h 78a498c3a227f2 Alexander Potapenko 2022-10-24 61 78a498c3a227f2 Alexander Potapenko 2022-10-24 62 #define __underlying_memchr __builtin_memchr 78a498c3a227f2 Alexander Potapenko 2022-10-24 @63 #define __underlying_memcmp __builtin_memcmp a28a6e860c6cf2 Francis Laniel 2021-02-25 64 #define __underlying_strcat __builtin_strcat a28a6e860c6cf2 Francis Laniel 2021-02-25 65 #define __underlying_strcpy __builtin_strcpy a28a6e860c6cf2 Francis Laniel 2021-02-25 66 #define __underlying_strlen __builtin_strlen a28a6e860c6cf2 Francis Laniel 2021-02-25 67 #define __underlying_strncat __builtin_strncat a28a6e860c6cf2 Francis Laniel 2021-02-25 68 #define __underlying_strncpy __builtin_strncpy a28a6e860c6cf2 Francis Laniel 2021-02-25 69 #endif a28a6e860c6cf2 Francis Laniel 2021-02-25 70 :::::: The code at line 63 was first introduced by commit :::::: 78a498c3a227f2ac773a8234b2ce092a4403f2c3 x86: fortify: kmsan: fix KMSAN fortify builds :::::: TO: Alexander Potapenko <glider@xxxxxxxxxx> :::::: CC: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki