This repository has been archived by the owner on Jul 1, 2020. It is now read-only.
Error: call to '__read_overflow2' declared with attribute error: detected read beyond size of object passed as 2nd parameter #142
Labels
tuxml-study-buildfailures
Discussions/insights about build failures
rawtuxdata.query("UBSAN_NULL == 'y' & IPV6 != 'm' & FORTIFY_SOURCE == 'y' & IPV6 != 'y' & INFINIBAND_ADDR_TRANS == 'y' & UBSAN_SANITIZE_ALL == 'y' & GENERIC_ALLOCATOR != 'n' & WANXL_BUILD_FIRMWARE != 'y' & AIC7XXX_BUILD_FIRMWARE != 'y' & AIC79XX_BUILD_FIRMWARE != 'y'")['cid'].values
There seems to be a problem between
FORTIFY_SOURCE
andIPV6
(as well asUBSAN_NULL
andUBSAN_ALIGNMENT
)The full messages are there:
https://gist.github.com/FAMILIAR-project/9b36437b6da01a912807ee4c854a0c2b
and basically a pattern occurs:
./include/linux/string.h:305:4: error: call to '__read_overflow2' declared with attribute error: detected read beyond size of object passed as 2nd parameter __read_overflow2();
I'm investigating qualitatively now, but I can already say the failure has hurt many users:
jurobystricky/Netgear-A6210#81
since the default configuration now comprises
FORTIFY_SOURCE
(a security option).also reported here:
lwfinger/rtl8188eu#251
lwfinger/rtl8188eu#112
in similar context
interesting discussion:
Thanks to CONFIG_FORTIFY_SOURCE, the compiler refused to compile this buggy code. See https://outflux.net/blog/archives/2017/09/05/security-things-in-linux-v4-13/ for details why this issue hasn't been noticed before kernel 4.13.
genodeftest/Netgear-A6210@dc7e9b8
The text was updated successfully, but these errors were encountered: