linux-wireless.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Christian Lamparter <chunkeey@gmail.com>
To: Arnd Bergmann <arnd@arndb.de>, Arnd Bergmann <arnd@kernel.org>,
	Kalle Valo <kvalo@kernel.org>, Kees Cook <keescook@chromium.org>,
	Johannes Berg <johannes.berg@intel.com>,
	Shiji Yang <yangshiji66@outlook.com>,
	Nick Kossifidis <mickflemm@gmail.com>,
	Jiri Slaby <jirislaby@kernel.org>,
	Christian Marangi <ansuelsmth@gmail.com>
Cc: linux-wireless@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH 1/2] carl9170: re-fix fortified-memset warning
Date: Fri, 23 Jun 2023 19:15:18 +0200	[thread overview]
Message-ID: <3bb839fe-1dfd-57f5-a5b0-be5adac57a4c@gmail.com> (raw)
In-Reply-To: <24986b5e-5cd1-4cd5-aff3-b5eab2c0fdde@app.fastmail.com>

On 6/23/23 18:05, Arnd Bergmann wrote:
> On Fri, Jun 23, 2023, at 17:38, Christian Lamparter wrote:
>> On 6/23/23 17:23, Arnd Bergmann wrote:
>>
>> Wait! I want to point out this funny thing is happening in ath too!
>>
>> https://lore.kernel.org/linux-wireless/TYAP286MB03154F9AAFD4C35BEEDE4A99BC4CA@TYAP286MB0315.JPNP286.PROD.OUTLOOK.COM/T/#mf1b8919a000fe661803c17073f48b3c410888541
>>
>> And that patch got NACK by Jiri Slaby because like me he suspects that
>> this is a compiler bug.
> 
> FWIW, that is one I don't see with clang-17 or gcc-13. The one I'm addressing
> here is the only thing I see in ath wireless with the default set of
> warning options, though this driver does have a couple of others that
> are unrelated, when you enable the source data check in memcpy() by
> building with W=1.
> 
>   In file included from  drivers/net/wireless/ath/ath9k/xmit.c:17:
> In file included from  include/linux/dma-mapping.h:7:
> In file included from include/linux/string.h:254:
> /home/arnd/arm-soc/include/linux/fortify-string.h:592:4: error: call to '__read_overflow2_field' declared with 'warning' attribute: detected read beyond size of field (2nd parameter); maybe use struct_group()? [-Werror,-Wattribute-warning]
>                          __read_overflow2_field(q_size_field, size);
>                          ^
> include/linux/fortify-string.h:592:4: error: call to '__read_overflow2_field' declared with 'warning' attribute: detected read beyond size of field (2nd parameter); maybe use struct_group()? [-Werror,-Wattribute-warning]
> 2 errors generated.
> /home/arnd/arm-soc/include/linux/fortify-string.h:592:4: error: call to '__read_overflow2_field' declared with 'warning' attribute: detected read beyond size of field (2nd parameter); maybe use struct_group()? [-Werror,-Wattribute-warning]
>                          __read_overflow2_field(q_size_field, size);
> 
>> so, what's going wrong with fortified there?
> 
> Kees might have a better answer to that, my best guess is that
> the one I'm addressing stems from the confusion between different
> union members.
> 
> Doing the randconfig builds with the latest compilers, carl9170 is the
> only one I see with fortified-string warnings, and there are a few
> dozen other drivers that I see with W=1, including one that affects
> all wireless drivers.

Hm, question here (to Jiri as well). Do you think that a workaround patch
for these sort-of-obvious-but-compiler-bug-but-failed-to-make-a-simple-reproducer
would be OK to get NACKed? In my case, I fiddled around with it and replaced the
the cc_ani memset in the following way:

|        memset(&common->cc_survey, 0, sizeof(common->cc_survey));
|-       memset(&common->cc_ani, 0, sizeof(common->cc_ani));
|+       common->cc_ani.cycles = common->cc_ani.rx_busy = common->cc_ani.rx_frame = common->cc_ani.tx_frame = 0;

(Note here: cc_survey and cc_ani are of the same struct ath_cycle_counters!
and they are right next to each other! Even better: reordering the memset
in the code does not help. Reordering it in the ath_common does!)

This is less intrusive since it only replaces one line... but I'm afraid it
too will get flagged for the same reason... Maybe can someone give Shiji Yang,
or me, if he has lost interest, some guidance on how this can be addressed?

Best Regards,
Christian

  reply	other threads:[~2023-06-23 17:15 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-06-23 15:23 [PATCH 1/2] carl9170: re-fix fortified-memset warning Arnd Bergmann
2023-06-23 15:24 ` [PATCH 2/2] mac80211: make ieee80211_tx_info padding explicit Arnd Bergmann
2023-06-23 23:07   ` Kees Cook
2023-06-23 15:38 ` [PATCH 1/2] carl9170: re-fix fortified-memset warning Christian Lamparter
2023-06-23 16:05   ` Arnd Bergmann
2023-06-23 17:15     ` Christian Lamparter [this message]
2023-06-26  6:51       ` Jiri Slaby
2023-06-23 23:33     ` Kees Cook
2023-06-23 23:04 ` Kees Cook

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=3bb839fe-1dfd-57f5-a5b0-be5adac57a4c@gmail.com \
    --to=chunkeey@gmail.com \
    --cc=ansuelsmth@gmail.com \
    --cc=arnd@arndb.de \
    --cc=arnd@kernel.org \
    --cc=jirislaby@kernel.org \
    --cc=johannes.berg@intel.com \
    --cc=keescook@chromium.org \
    --cc=kvalo@kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-wireless@vger.kernel.org \
    --cc=mickflemm@gmail.com \
    --cc=yangshiji66@outlook.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).