From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id CEB16C369D5 for ; Tue, 22 Apr 2025 02:43:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:References:In-Reply-To: Message-Id:Date:Subject:Cc:To:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=Nhv24Jo2ZzSuwAqg9gwYFy3wceHZFez6DDIttDYqgaU=; b=irG4zSdfDNJqjh o50furpHFdLIq6l3tsZVOrYEHK2RoXlNECXHZ+fTTtIiq0+ABZv8MxTr609pYq7VAYH5jmUluVmFD 1ko/0l87PL8YTYUlRwKMBuzI5EmN+es4rI6U2LfeawAiQMut1cF/Jgorh+3ycUmBjXrj7ASombQh4 HpxsdNmKUtPRfPrbyjXdVpJs5Zfs3O/7VgUG7SybskdsVEQMRLJenjLlyZY2eUr1da8xC1crm+Wk6 B3xNoSM+h7wrrqOq7YUuX4AYXF+KPS41molq6GKpO+TewIBp9/yMN0+cu675drF5LasTJ9PKxDcyP CHDuSJmz66EMqtn8mtig==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux)) id 1u73be-00000005flr-1BuK; Tue, 22 Apr 2025 02:43:30 +0000 Received: from dfw.source.kernel.org ([139.178.84.217]) by bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux)) id 1u73E5-00000005Zxe-1zQ2 for linux-riscv@lists.infradead.org; Tue, 22 Apr 2025 02:19:14 +0000 Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by dfw.source.kernel.org (Postfix) with ESMTP id E399F5C5A83; Tue, 22 Apr 2025 02:16:51 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 86C10C4CEEC; Tue, 22 Apr 2025 02:19:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1745288348; bh=iv/M+G4FWbUb2I/9nG++kGHvAyggO8O8m+i+jsiKPss=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Js5jggHxBaTEYOslCpWTlE6XQ0zimSZ9VuYYO397Ex3PiCRtAfC+m8Pe++uK5iceH XBmTzsbdy+prU+Q8bXwfbh/7weOzw510s7oidj37SxAEF8E/buA+emKSWmC6EL4eAt r+NP8XKROomFSNRQ+yLvriRrnT6u0bfG7UZZRwr/Di17heCmiLPXADM8foKFQCe2hI qiM0pKSHoACcpfEXK9TU7k5E0wLhldUNHf7D9JtVfjwgJ30QSD2bKBD78VrQ6mZfta BBeZuRECH+cxBLGHjxTh3vAAGRJloaE3s4ptXG3KLj+fl31JN+PO+MLw4v0hEYzXOF FcRFgASpkTMmA== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Nathan Chancellor , Alexandre Ghiti , "Dmitry V . Levin" , Sasha Levin , paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, linux-riscv@lists.infradead.org Subject: [PATCH AUTOSEL 5.4 3/3] riscv: Avoid fortify warning in syscall_get_arguments() Date: Mon, 21 Apr 2025 22:19:02 -0400 Message-Id: <20250422021903.1942115-3-sashal@kernel.org> X-Mailer: git-send-email 2.39.5 In-Reply-To: <20250422021903.1942115-1-sashal@kernel.org> References: <20250422021903.1942115-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore X-stable-base: Linux 5.4.292 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20250421_191909_616978_691306A1 X-CRM114-Status: GOOD ( 13.30 ) X-BeenThere: linux-riscv@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-riscv" Errors-To: linux-riscv-bounces+linux-riscv=archiver.kernel.org@lists.infradead.org From: Nathan Chancellor [ Upstream commit 1413708f990cb7d025affd706ba9c23e2bfc1a27 ] When building with CONFIG_FORTIFY_SOURCE=y and W=1, there is a warning because of the memcpy() in syscall_get_arguments(): In file included from include/linux/string.h:392, from include/linux/bitmap.h:13, from include/linux/cpumask.h:12, from arch/riscv/include/asm/processor.h:55, from include/linux/sched.h:13, from kernel/ptrace.c:13: In function 'fortify_memcpy_chk', inlined from 'syscall_get_arguments.isra' at arch/riscv/include/asm/syscall.h:66:2: include/linux/fortify-string.h:580:25: error: call to '__read_overflow2_field' declared with attribute warning: detected read beyond size of field (2nd parameter); maybe use struct_group()? [-Werror=attribute-warning] 580 | __read_overflow2_field(q_size_field, size); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ cc1: all warnings being treated as errors The fortified memcpy() routine enforces that the source is not overread and the destination is not overwritten if the size of either field and the size of the copy are known at compile time. The memcpy() in syscall_get_arguments() intentionally overreads from a1 to a5 in 'struct pt_regs' but this is bigger than the size of a1. Normally, this could be solved by wrapping a1 through a5 with struct_group() but there was already a struct_group() applied to these members in commit bba547810c66 ("riscv: tracing: Fix __write_overflow_field in ftrace_partial_regs()"). Just avoid memcpy() altogether and write the copying of args from regs manually, which clears up the warning at the expense of three extra lines of code. Signed-off-by: Nathan Chancellor Reviewed-by: Alexandre Ghiti Reviewed-by: Dmitry V. Levin Link: https://lore.kernel.org/r/20250409-riscv-avoid-fortify-warning-syscall_get_arguments-v1-1-7853436d4755@kernel.org Signed-off-by: Alexandre Ghiti Signed-off-by: Sasha Levin --- arch/riscv/include/asm/syscall.h | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/arch/riscv/include/asm/syscall.h b/arch/riscv/include/asm/syscall.h index 42347d0981e7e..e53690b30bbeb 100644 --- a/arch/riscv/include/asm/syscall.h +++ b/arch/riscv/include/asm/syscall.h @@ -67,8 +67,11 @@ static inline void syscall_get_arguments(struct task_struct *task, unsigned long *args) { args[0] = regs->orig_a0; - args++; - memcpy(args, ®s->a1, 5 * sizeof(args[0])); + args[1] = regs->a1; + args[2] = regs->a2; + args[3] = regs->a3; + args[4] = regs->a4; + args[5] = regs->a5; } static inline void syscall_set_arguments(struct task_struct *task, -- 2.39.5 _______________________________________________ linux-riscv mailing list linux-riscv@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-riscv