On Tue, Jun 14, 2022 at 10:40:50AM +0100, Bruce Richardson wrote:
> On Wed, Jun 08, 2022 at 08:23:02AM -0700, Stephen Hemminger wrote:
> > On Thu,  2 Jun 2022 16:08:30 +0100
> > Bruce Richardson <bruce.richard...@intel.com> wrote:
> > 
> > > This patchset adds a coccinelle script to clean-up zero-length
> > > arrays in structures. The final patches are the result of running
> > > that script on the DPDK repository.
> > > 
> > > Bruce Richardson (4):
> > >   cocci: add script for zero-length arrays in structs
> > >   drivers: replace zero-length arrays with undimensioned ones
> > >   lib: replace zero-length arrays with undimensioned ones
> > >   app: examples: replace zero-length arrays with undimensioned ones
> > > 
> > >  app/test/test_table_tables.c                  |  2 +-
> > >  devtools/cocci/zero_length_array.cocci        | 21 +++++++++++++++
> > >  drivers/bus/dpaa/include/netcfg.h             |  4 +--
> > >  drivers/bus/vmbus/rte_vmbus_reg.h             |  4 +--
> > >  drivers/common/cnxk/roc_se.h                  |  2 +-
> > >  drivers/common/dpaax/caamflib/desc/ipsec.h    |  2 +-
> > >  drivers/common/dpaax/dpaax_iova_table.h       |  2 +-
> > >  drivers/common/mlx5/mlx5_prm.h                | 10 +++----
> > >  drivers/crypto/ipsec_mb/ipsec_mb_private.h    |  4 +--
> > >  drivers/crypto/virtio/virtio_ring.h           |  4 +--
> > >  drivers/crypto/virtio/virtqueue.h             |  2 +-
> > >  drivers/net/atlantic/hw_atl/hw_atl_utils.h    |  2 +-
> > >  drivers/net/cxgbe/clip_tbl.h                  |  2 +-
> > >  drivers/net/cxgbe/l2t.h                       |  2 +-
> > >  drivers/net/cxgbe/mps_tcam.h                  |  2 +-
> > >  drivers/net/cxgbe/smt.h                       |  2 +-
> > >  drivers/net/enic/base/vnic_devcmd.h           |  2 +-
> > >  drivers/net/hinic/hinic_pmd_tx.h              |  2 +-
> > >  drivers/net/mlx5/mlx5_tx.h                    |  2 +-
> > >  drivers/net/nfp/nfpcore/nfp_nsp.h             |  2 +-
> > >  drivers/net/virtio/virtio_ring.h              |  4 +--
> > >  drivers/net/virtio/virtio_user/vhost_kernel.c |  2 +-
> > >  drivers/net/virtio/virtio_user/vhost_vdpa.c   |  2 +-
> > >  drivers/net/virtio/virtqueue.h                |  2 +-
> > >  drivers/regex/mlx5/mlx5_rxp.h                 |  4 +--
> > >  examples/ip_reassembly/main.c                 |  2 +-
> > >  examples/ptpclient/ptpclient.c                |  4 +--
> > >  lib/cryptodev/cryptodev_pmd.h                 |  2 +-
> > >  lib/cryptodev/rte_cryptodev.h                 |  2 +-
> > >  lib/eventdev/rte_event_timer_adapter.h        |  2 +-
> > >  lib/ip_frag/ip_reassembly.h                   |  2 +-
> > >  lib/ipsec/sa.h                                |  2 +-
> > >  lib/rib/rte_rib.c                             |  2 +-
> > >  lib/rib/rte_rib6.c                            |  2 +-
> > >  lib/table/rte_swx_table_learner.c             |  4 +--
> > >  lib/table/rte_table_hash_key16.c              |  4 +--
> > >  lib/table/rte_table_hash_key32.c              |  4 +--
> > >  lib/table/rte_table_hash_key8.c               |  4 +--
> > >  lib/vhost/rte_vhost.h                         |  4 +--
> > >  40 files changed, 101 insertions(+), 54 deletions(-)
> > >  create mode 100644 devtools/cocci/zero_length_array.cocci
> > >  create mode 100644 lib/count_comments.py
> > > 
> > > --
> > > 2.34.1
> > > 
> > 
> > Bruce, looking at this commit, it looks like the underlying cause
> > of the problem with iavf was it is using array size of one
> > when flex array should be used:
> > 
> > commit b5b3ea803e4741ad6a46a38d8227c78226d9054d
> > Author: Kevin Traynor <ktray...@redhat.com>
> > Date:   Fri Apr 17 16:43:35 2020 +0100
> > 
> >     eal/x86: ignore gcc 10 stringop-overflow warnings
> >     
> >     stringop-overflow warns when it sees a possible overflow
> >     in a string operation.
> >     
> >     In the rte_memcpy functions different branches are taken
> >     depending on the size. stringop-overflow is raised for the
> >     branches in the function where it sees the static size of the
> >     src could be overflowed.
> >     
> >     However, in reality a correct size argument and in some cases
> >     dynamic allocation would ensure that this does not happen.
> >     
> >     For example, in the case below for key, the correct path will be
> >     chosen in rte_memcpy_generic at runtime based on the size argument
> >     but as some paths in the function could lead to a cast to 32 bytes
> >     a warning is raised.
> >     
> >     In function ‘_mm256_storeu_si256’,
> >     inlined from ‘rte_memcpy_generic’
> >     at ../lib/librte_eal/common/include/arch/x86/rte_memcpy.h:315:2,
> >     inlined from ‘iavf_configure_rss_key’
> >     at ../lib/librte_eal/common/include/arch/x86/rte_memcpy.h:869:10:
> >     
> >     /usr/lib/gcc/x86_64-redhat-linux/10/include/avxintrin.h:928:8:
> >     warning: writing 32 bytes into a region of size 1 [-Wstringop-overflow=]
> >       928 |   *__P = __A;
> >           |   ~~~~~^~~~~
> >     In file included
> >     from ../drivers/net/iavf/../../common/iavf/iavf_prototype.h:10,
> >     from ../drivers/net/iavf/iavf.h:9,
> >     from ../drivers/net/iavf/iavf_vchnl.c:22:
> >     
> >     ../drivers/net/iavf/iavf_vchnl.c:
> >     In function ‘iavf_configure_rss_key’:
> >     
> >     ../drivers/net/iavf/../../common/iavf/virtchnl.h:508:5:
> >     note: at offset 0 to object ‘key’ with size 1 declared here
> >       508 |  u8 key[1];         /* RSS hash key, packed bytes */
> >           |     ^~~
> >     
> 
> I would tend to agree with your assessment. It looks like the "u8 key[1]"
> value should probably be "u8 key[]", and also in the following structure in
> the file, "u8 lut[1]" should probably be "u8 lut[]".
> 
> Adding maintainers for driver on CC
> 
> Beilei, Jingjing, 
> 
> in "common/iavf/virtchnl.h", there are quite a number of values at the end
> of structs which are defined as arrays of size 1. We suspect that many of
> these are placeholder arrays which should be given as unsigned arrays. Is
> this assessment correct?
>
s/unsigned arrays/flexible array members/ 

i.e. arrays without a given size "[]" 

Reply via email to