From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 8CA1AC3DA4A for ; Mon, 19 Aug 2024 11:02:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:Content-Transfer-Encoding: Content-Type:In-Reply-To:From:References:CC:To:Subject:MIME-Version:Date: Message-ID:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=NJXk75s0NGmai5nurtuLfb/qOgUWKGFakaTaC6SGm7Y=; b=HIjlln6XygSjKCEPbV87DtuBuY ONrEXnoTi+1J3y6a3jpo65e08EYsD+uXkB+wfZo2tl16/ZHNvFD96SeTUn/LSFPjFU9462b2N9xY8 UxBP/qJBI+v37ROamIX5r1eLzzLN0jwvlnvfDUeZTkuXMlUe8JuGFGECsegaQbWsQVTMvUSf3PrPn Lysg+y+5z/2IbNIWFAB+IqiGas8L46uGZ35GVHzksVln0ReLZkha2oHJvEcJUEgpNi5jzGQWXhQLx L2/6af8LQsVxbT/Jph+RZiuK352mclHez0ZYQKrsXsMrbqLmM85670Ioi9laBnTBhhp2hiqJxvgpD IPQ2I/kg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.97.1 #2 (Red Hat Linux)) id 1sg09b-00000001AMA-2CQU; Mon, 19 Aug 2024 11:02:27 +0000 Received: from szxga06-in.huawei.com ([45.249.212.32]) by bombadil.infradead.org with esmtps (Exim 4.97.1 #2 (Red Hat Linux)) id 1sg08t-00000001ADp-1CK3 for linux-arm-kernel@lists.infradead.org; Mon, 19 Aug 2024 11:01:46 +0000 Received: from mail.maildlp.com (unknown [172.19.162.112]) by szxga06-in.huawei.com (SkyGuard) with ESMTP id 4WnV3W6nFkz1xvTm; Mon, 19 Aug 2024 18:59:35 +0800 (CST) Received: from kwepemh500013.china.huawei.com (unknown [7.202.181.146]) by mail.maildlp.com (Postfix) with ESMTPS id 90FEC140109; Mon, 19 Aug 2024 19:01:29 +0800 (CST) Received: from [10.67.109.254] (10.67.109.254) by kwepemh500013.china.huawei.com (7.202.181.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.11; Mon, 19 Aug 2024 19:01:29 +0800 Message-ID: <5979b3b7-cd42-d01a-6c8f-5df7b698b324@huawei.com> Date: Mon, 19 Aug 2024 19:01:28 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.2.0 Subject: Re: [PATCH -next] firmware: arm_ffa: Fix beyond size of field warning Content-Language: en-US To: Sudeep Holla CC: , References: <20240816100258.2159447-1-ruanjinjie@huawei.com> From: Jinjie Ruan In-Reply-To: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-Originating-IP: [10.67.109.254] X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To kwepemh500013.china.huawei.com (7.202.181.146) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20240819_040144_542579_0F4DEFA1 X-CRM114-Status: GOOD ( 15.20 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On 2024/8/19 18:35, Sudeep Holla wrote: > On Fri, Aug 16, 2024 at 06:02:58PM +0800, Jinjie Ruan wrote: >> An allmodconfig build of arm64 resulted in following warning: >> >> In function ‘fortify_memcpy_chk’, >> inlined from ‘export_uuid’ at ./include/linux/uuid.h:88:2, >> inlined from ‘ffa_msg_send_direct_req2’ at ./drivers/firmware/arm_ffa/driver.c:488:2: >> ./include/linux/fortify-string.h:571:25: error: call to ‘__write_overflow_field’ declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror=attribute-warning] >> 571 | __write_overflow_field(p_size_field, size); >> | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >> In function ‘fortify_memcpy_chk’, >> inlined from ‘ffa_msg_send_direct_req2’ at ./drivers/firmware/arm_ffa/driver.c:489:2: >> ./linux-next/include/linux/fortify-string.h:571:25: error: call to ‘__write_overflow_field’ declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror=attribute-warning] >> 571 | __write_overflow_field(p_size_field, size); >> | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >> >> Because ffa_msg_send_direct_req2() memcpy uuid_t and struct >> ffa_send_direct_data2 data to unsigned long dst, the copy size is 2 or >> or 14 unsigned long which beyond size of dst size, fix it by using a temp >> array for memcpy. >> >> Signed-off-by: Jinjie Ruan >> --- >> drivers/firmware/arm_ffa/driver.c | 14 ++++++++++++-- >> 1 file changed, 12 insertions(+), 2 deletions(-) >> >> diff --git a/drivers/firmware/arm_ffa/driver.c b/drivers/firmware/arm_ffa/driver.c >> index 1e3764852118..674fbe008ea6 100644 >> --- a/drivers/firmware/arm_ffa/driver.c >> +++ b/drivers/firmware/arm_ffa/driver.c >> @@ -480,13 +480,23 @@ static int ffa_msg_send2(u16 src_id, u16 dst_id, void *buf, size_t sz) >> static int ffa_msg_send_direct_req2(u16 src_id, u16 dst_id, const uuid_t *uuid, >> struct ffa_send_direct_data2 *data) >> { >> + unsigned long args_data[14]; >> + unsigned long args_uuid[2]; >> + unsigned long *data_ptr; >> + >> u32 src_dst_ids = PACK_TARGET_INFO(src_id, dst_id); >> ffa_value_t ret, args = { >> .a0 = FFA_MSG_SEND_DIRECT_REQ2, .a1 = src_dst_ids, >> }; >> >> - export_uuid((u8 *)&args.a2, uuid); >> - memcpy(&args.a4, data, sizeof(*data)); >> + memcpy(args_uuid, uuid, sizeof(uuid_t)); >> + args.a2 = args_uuid[0]; >> + args.a3 = args_uuid[1]; >> + >> + memcpy(args_data, data, sizeof(*data)); >> + data_ptr = &args.a4; >> + for (int i = 0; i < 14; i++) >> + *data_ptr++ = args_data[i]; >> > > So we end up with double copy for both uuid and ffa_send_direct_data2 ? > This is not correct and not needed. > > Which toolchain are you using ? I got error only for memcpy which I forgot > to push to -next, now fixed. It must appear in -next soon. Use the newest linux-next and `make Image ARCH=arm64 CROSS_COMPILE=aarch64-linux-gnu-`, the above compile error occurs. >