On 2022-06-09 9:57 PM, Pierre-Louis Bossart wrote:
+static int
+avs_parse_uuid_token(struct snd_soc_component *comp, void *elem, void *object, u32 offset)
+{
+ struct snd_soc_tplg_vendor_value_elem *tuple = elem;
+ guid_t *val = (guid_t *)((u8 *)object + offset);
+
+ guid_copy((guid_t *)val, (const guid_t *)&tuple->value);
+
+ return 0;
+}
Cezary and Amadeusz, could you please look into this 'make W=1' error?
...
/data/pbossart/ktest/work/sound/soc/intel/avs/topology.c:9:
In function ‘fortify_memcpy_chk’,
inlined from ‘guid_copy’ at
/data/pbossart/ktest/work/include/linux/uuid.h:43:2,
inlined from ‘avs_parse_uuid_token’ at
/data/pbossart/ktest/work/sound/soc/intel/avs/topology.c:134:2:
/data/pbossart/ktest/work/include/linux/fortify-string.h:352:25: error:
call to ‘__read_overflow2_field’ declared with attribute warning:
detected read beyond size of field (2nd parameter); maybe use
struct_group()? [-Werror=attribute-warning]
352 | __read_overflow2_field(q_size_field, size);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
cc1: all warnings being treated as errors
Hello,
Thanks for the report! Already investigating, if all goes well patch
will be provided today.
Regards,
Czarek