platform/chrome: cros_ec_vbc: Fix -Warray-bounds warnings
authorGustavo A. R. Silva <gustavoars@kernel.org>
Thu, 30 Mar 2023 01:54:02 +0000 (19:54 -0600)
committerTzung-Bi Shih <tzungbi@kernel.org>
Fri, 15 Dec 2023 08:02:49 +0000 (16:02 +0800)
GCC-13 (and Clang) does not like having a partially allocated object,
since it cannot reason about it for bounds checking.

Notice that the compiler is legitimately complaining about accessing
an object (params, in this case) for which not enough memory was
allocated.

The object is of size 20 bytes:

struct ec_params_vbnvcontext {
uint32_t                   op;                   /*     0     4 */
uint8_t                    block[16];            /*     4    16 */

/* size: 20, cachelines: 1, members: 2 */
/* last cacheline: 20 bytes */
};

but only 16 bytes are allocated:

sizeof(struct ec_response_vbnvcontext) == 16

In this case, as only enough space for the op field is allocated,
we can use an object of type uint32_t instead of a whole
struct ec_params_vbnvcontext (for which not enough memory is
allocated).

Fix the following warning seen under GCC 13:
drivers/platform/chrome/cros_ec_vbc.c: In function ‘vboot_context_read’:
drivers/platform/chrome/cros_ec_vbc.c:36:15: warning: array subscript ‘struct ec_params_vbnvcontext[1]’ is partly outside array bounds of ‘unsigned char[36]’ [-Warray-bounds=]
   36 |         params->op = EC_VBNV_CONTEXT_OP_READ;
      |               ^~
In file included from drivers/platform/chrome/cros_ec_vbc.c:12:
In function ‘kmalloc’,
    inlined from ‘vboot_context_read’ at drivers/platform/chrome/cros_ec_vbc.c:30:8:
./include/linux/slab.h:580:24: note: at offset 20 into object of size 36 allocated by ‘kmalloc_trace’
  580 |                 return kmalloc_trace(
      |                        ^~~~~~~~~~~~~~
  581 |                                 kmalloc_caches[kmalloc_type(flags)][index],
      |                                 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  582 |                                 flags, size);
      |                                 ~~~~~~~~~~~~

Link: https://github.com/KSPP/linux/issues/278
Signed-off-by: "Gustavo A. R. Silva" <gustavoars@kernel.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Link: https://lore.kernel.org/r/ZCTrutoN+9TiJM8u@work
Signed-off-by: Tzung-Bi Shih <tzungbi@kernel.org>
drivers/platform/chrome/cros_ec_vbc.c

index 2e4af10c76792e3efce87decd00bbfc98ddd5bbf..274ea0c64b33ba0992c3e6d5fd6503ed564fa96a 100644 (file)
@@ -20,10 +20,14 @@ static ssize_t vboot_context_read(struct file *filp, struct kobject *kobj,
        struct device *dev = kobj_to_dev(kobj);
        struct cros_ec_dev *ec = to_cros_ec_dev(dev);
        struct cros_ec_device *ecdev = ec->ec_dev;
-       struct ec_params_vbnvcontext *params;
        struct cros_ec_command *msg;
+       /*
+        * This should be a pointer to the same type as op field in
+        * struct ec_params_vbnvcontext.
+        */
+       uint32_t *params_op;
        int err;
-       const size_t para_sz = sizeof(params->op);
+       const size_t para_sz = sizeof(*params_op);
        const size_t resp_sz = sizeof(struct ec_response_vbnvcontext);
        const size_t payload = max(para_sz, resp_sz);
 
@@ -32,8 +36,8 @@ static ssize_t vboot_context_read(struct file *filp, struct kobject *kobj,
                return -ENOMEM;
 
        /* NB: we only kmalloc()ated enough space for the op field */
-       params = (struct ec_params_vbnvcontext *)msg->data;
-       params->op = EC_VBNV_CONTEXT_OP_READ;
+       params_op = (uint32_t *)msg->data;
+       *params_op = EC_VBNV_CONTEXT_OP_READ;
 
        msg->version = EC_VER_VBNV_CONTEXT;
        msg->command = EC_CMD_VBNV_CONTEXT;