From patchwork Wed May 24 02:12:46 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: "Gustavo A. R. Silva" X-Patchwork-Id: 98247 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:b0ea:0:b0:3b6:4342:cba0 with SMTP id b10csp2547040vqo; Tue, 23 May 2023 19:22:31 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7Kt26Tpuam/LFyLYTsKfkXRh75jI5arbssupCbI3MSZapKfP898vro42dzbkTuVbVTIazd X-Received: by 2002:a17:902:ab14:b0:1ac:750e:33f4 with SMTP id ik20-20020a170902ab1400b001ac750e33f4mr13288892plb.32.1684894950725; Tue, 23 May 2023 19:22:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684894950; cv=none; d=google.com; s=arc-20160816; b=J9PXCNx4GyvXHGCDdd/R3629rncYGGXhX0NBcr+gJFOcwZbEdJz2hfH9O2HPSgIgEh /m8FsYFBOwdgFE4C15Z5pMJVKqVR94JcI4GH09U9G8LTpq97t/ntXFlzS90cywtfJHNT 0HWRKvrFTZEnLgwAiCMIIUWQLE6uK4tqRL0S8IhUtpIT2CNW85nZx0oMFuVTSgbtZRMN HScvqSR8Ggq0slZik3u3a6zOeP8c8FfnvBBrW75Hpxwf5xwJg3BjfW7KeyHuoOS/78BW Lw6IkFr54FkB7DzzBbFItgpj+o9/kegvpZ/hVsIH2iMNG+3Xf+lOpDMuKusIYi09g9C+ hYkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-disposition :mime-version:message-id:subject:cc:to:from:date:dkim-signature; bh=L/Oizn3HHRYDYBUieqvniZYiXHvUIBDrpzNwHFfcIUw=; b=kOJhjOwLtqItteji+U8BYHcU1oQKKvgerDnVbfPpwVE4ifHyzOnNs2kB79JWAV/iEX 90ydMBIr5tj+Rym6CXwOUDHBlVgFk91qbV2JkqZ7YFYDAxz2uzzeXz9OW9JQfDSd04P9 w1Y6gpxnlMEe3lpTJBE8rmvfP0sytsSX31VKdoZ470Hx3l5RroBnUYOoSuBi09BpqBlb 7Mw0HMwsyFPGuulSg/jDdmR2anhuemD2GGFKNod7msEXHRzP/w7lEQSyf9LnFJPj1uKM LI/DyotJZ2HEARHkGJV3R3p90z30s/+RFsxw6DQUEpzYMYiVsAs78iN9J2rFMsj4dx+J wQ9Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=DV34t2dY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id jd3-20020a170903260300b001a51bb4ad79si5784341plb.42.2023.05.23.19.22.15; Tue, 23 May 2023 19:22:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=DV34t2dY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239089AbjEXCMI (ORCPT + 99 others); Tue, 23 May 2023 22:12:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48750 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236998AbjEXCMG (ORCPT ); Tue, 23 May 2023 22:12:06 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 23507E48; Tue, 23 May 2023 19:11:56 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id B4AF2637EF; Wed, 24 May 2023 02:11:55 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 13B60C433D2; Wed, 24 May 2023 02:11:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1684894315; bh=ciYnv1aFoGmFR4E+7iAdi4r/6ifLsJjIccdxEn4Wea8=; h=Date:From:To:Cc:Subject:From; b=DV34t2dY8RSLHh02ZTuPDRWPJ1LpnWMQ320RRABfgjwF/Vuf+AcGOvOEZxQV/3sg8 G2Cb5BziE0Nlc74a8DQpi2eU7G3Y27+3/Rctn8VM1PBPzryM2xaqA3S5AJHSFW62V9 f79v8ey3OcgdkleMit40QgRQcgcI6O15VHNipHz0Mjlw7Cfu2lg+2a00fL4Oc7ped0 E3DNZ/VWgCfUMdjoRrHxA64HVaHXc7rQuiBfhlVzd2b5e+/eUelcY2KJLRJAQxntXl f72UY+bDeXxsev8fxQZ6FfbetVlcC1Z8K3Yy3R+u81+O13TQ0ifpeqzSFA2dakLvua tjbFtI2AcgZzg== Date: Tue, 23 May 2023 20:12:46 -0600 From: "Gustavo A. R. Silva" To: Ping-Ke Shih , Kalle Valo Cc: linux-wireless@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" , linux-hardening@vger.kernel.org Subject: [PATCH][next] wifi: rtw89: coex: Fix __write_overflow_field error Message-ID: MIME-Version: 1.0 Content-Disposition: inline X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1766740407635041445?= X-GMAIL-MSGID: =?utf-8?q?1766740407635041445?= One-element arrays as fake flexible arrays are deprecated, and we are moving towards adopting C99 flexible-array members instead. Fix the following error seen under GCC-13 and -fstrict-flex-arrays=3: In function ‘fortify_memcpy_chk’, inlined from ‘_append_tdma’ at drivers/net/wireless/realtek/rtw89/coex.c:1579:3: include/linux/fortify-string.h:583:25: error: call to ‘__write_overflow_field’ declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror=attribute-warning] 583 | __write_overflow_field(p_size_field, size); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ This helps with the ongoing efforts to tighten the FORTIFY_SOURCE routines on memcpy() and help us make progress towards globally enabling -fstrict-flex-arrays=3 [1]. This results in no differences in binary output. Link: https://github.com/KSPP/linux/issues/21 Link: https://github.com/KSPP/linux/issues/299 Link: https://gcc.gnu.org/pipermail/gcc-patches/2022-October/602902.html [1] Signed-off-by: Gustavo A. R. Silva --- drivers/net/wireless/realtek/rtw89/coex.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/wireless/realtek/rtw89/coex.c b/drivers/net/wireless/realtek/rtw89/coex.c index 3a586a971e8f..bda0e1e99a8c 100644 --- a/drivers/net/wireless/realtek/rtw89/coex.c +++ b/drivers/net/wireless/realtek/rtw89/coex.c @@ -206,7 +206,7 @@ static const struct rtw89_btc_ver rtw89_btc_ver_defs[] = { struct rtw89_btc_btf_tlv { u8 type; u8 len; - u8 val[1]; + u8 val[]; } __packed; enum btc_btf_set_report_en {