[PATCH v2 02/14] ASoC: Intel: avs: Add topology parsing infrastructure

Cezary Rojewski cezary.rojewski at intel.com
Fri Jun 10 12:01:46 CEST 2022


On 2022-06-09 9:57 PM, Pierre-Louis Bossart wrote:
> 
>> +static int
>> +avs_parse_uuid_token(struct snd_soc_component *comp, void *elem, void *object, u32 offset)
>> +{
>> +	struct snd_soc_tplg_vendor_value_elem *tuple = elem;
>> +	guid_t *val = (guid_t *)((u8 *)object + offset);
>> +
>> +	guid_copy((guid_t *)val, (const guid_t *)&tuple->value);
>> +
>> +	return 0;
>> +}
> 
> Cezary and Amadeusz, could you please look into this 'make W=1' error?

...

> /data/pbossart/ktest/work/sound/soc/intel/avs/topology.c:9:
> 
> In function ‘fortify_memcpy_chk’,
> 
>      inlined from ‘guid_copy’ at
> /data/pbossart/ktest/work/include/linux/uuid.h:43:2,
> 
>      inlined from ‘avs_parse_uuid_token’ at
> /data/pbossart/ktest/work/sound/soc/intel/avs/topology.c:134:2:
> 
> /data/pbossart/ktest/work/include/linux/fortify-string.h:352:25: error:
> call to ‘__read_overflow2_field’ declared with attribute warning:
> detected read beyond size of field (2nd parameter); maybe use
> struct_group()? [-Werror=attribute-warning]
> 
>    352 |                         __read_overflow2_field(q_size_field, size);
> 
>        |                         ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
> 
> cc1: all warnings being treated as errors


Hello,

Thanks for the report! Already investigating, if all goes well patch 
will be provided today.


Regards,
Czarek


More information about the Alsa-devel mailing list