From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 22B30A058A; Tue, 24 Mar 2020 19:56:47 +0100 (CET) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 5C0C42BCE; Tue, 24 Mar 2020 19:56:45 +0100 (CET) Received: from inbox.dpdk.org (xvm-172-178.dc0.ghst.net [95.142.172.178]) by dpdk.org (Postfix) with ESMTP id 3DD832BAE for ; Tue, 24 Mar 2020 19:56:44 +0100 (CET) Received: by inbox.dpdk.org (Postfix, from userid 33) id 25B65A058B; Tue, 24 Mar 2020 19:56:44 +0100 (CET) From: bugzilla@dpdk.org To: dev@dpdk.org Date: Tue, 24 Mar 2020 18:56:43 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: DPDK X-Bugzilla-Component: core X-Bugzilla-Version: 20.05 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: kevuzaj@gmail.com X-Bugzilla-Status: UNCONFIRMED X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: dev@dpdk.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter target_milestone attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://bugs.dpdk.org/ Auto-Submitted: auto-generated X-Auto-Response-Suppress: All MIME-Version: 1.0 Subject: [dpdk-dev] [Bug 421] gcc 10.0.1 stringops-overflow warnings X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" https://bugs.dpdk.org/show_bug.cgi?id=3D421 Bug ID: 421 Summary: gcc 10.0.1 stringops-overflow warnings Product: DPDK Version: 20.05 Hardware: All OS: Linux Status: UNCONFIRMED Severity: normal Priority: Normal Component: core Assignee: dev@dpdk.org Reporter: kevuzaj@gmail.com Target Milestone: --- Created attachment 85 --> https://bugs.dpdk.org/attachment.cgi?id=3D85&action=3Dedit Log of gcc 10.0.1 stringop-overflow warnings As well as the ones reported for crypto in Bug 394 there are many other stringop-overflow warnings with gcc 10.0.1 which is the default with Fedora= 32. This is caused by the following documented change since GCC: https://gcc.gnu.org/gcc-10/changes.html Enhancements to existing warnings:=20 -Wstringop-overflow detects more out-of-bounds stores to member arrays including zero-length arrays, dynamically allocated objects and variable le= ngth arrays, as well as more instances of reads of unterminated character arrays= by string built-in functions. The warning also detects out-of-bounds accesses = by calls to user-defined functions declared with the new attribute access.=20 The following files trigger have these warnings. Full log of warnings attac= hed. ../drivers/crypto/caam_jr/caam_jr_pvt.h ../drivers/crypto/ccp/ccp_crypto.h ../drivers/crypto/dpaa_sec/dpaa_sec.h ../drivers/crypto/virtio/virtio_cryptodev.h ../drivers/net/enic/base/vnic_dev.c ../drivers/net/iavf/../../common/iavf/virtchnl.h ../drivers/net/ice/base/ice_adminq_cmd.h ../drivers/net/mlx4/mlx4_rxtx.c ../drivers/net/qede/base/ecore_mcp.c ../lib/librte_cryptodev/rte_cryptodev.h ../lib/librte_pipeline/rte_table_action.c Some of these are easy to spot as false positives because of dynamic memory allocation. Others seem to be too but would need component maintainers to confirm. Can add individual Bugs per component if needed. Proposed solution is to add -Wno-stringop-overflow flag at top level. --=20 You are receiving this mail because: You are the assignee for the bug.=