On Wed, Jun 16, 2021 at 01:19:17PM -0700, Kees Cook wrote: > In preparation for FORTIFY_SOURCE performing compile-time and run-time > field array bounds checking for memcpy(), memmove(), and memset(), > avoid intentionally reading across neighboring array fields. > > Add a wrapping structure to serve as the memcpy() source, so the compiler > can do appropriate bounds checking, avoiding this future warning: > > In function '__fortify_memcpy', > inlined from 'create_uid' at drivers/s390/block/dasd_eckd.c:749:2: > ./include/linux/fortify-string.h:246:4: error: call to '__read_overflow2_field' declared with attribute error: detected read beyond size of field (2nd parameter) > > Signed-off-by: Kees Cook <keescook@xxxxxxxxxxxx> > --- > drivers/s390/block/dasd_eckd.c | 2 +- > drivers/s390/block/dasd_eckd.h | 6 ++++-- > 2 files changed, 5 insertions(+), 3 deletions(-) I'll leave it up to Stefan Haberland and Jan Hoeppner to handle this one.