[PATCH v2 02/14] ASoC: Intel: avs: Add topology parsing infrastructure
Cezary Rojewski
cezary.rojewski at intel.com
Fri Jun 10 12:01:46 CEST 2022
On 2022-06-09 9:57 PM, Pierre-Louis Bossart wrote:
>
>> +static int
>> +avs_parse_uuid_token(struct snd_soc_component *comp, void *elem, void *object, u32 offset)
>> +{
>> + struct snd_soc_tplg_vendor_value_elem *tuple = elem;
>> + guid_t *val = (guid_t *)((u8 *)object + offset);
>> +
>> + guid_copy((guid_t *)val, (const guid_t *)&tuple->value);
>> +
>> + return 0;
>> +}
>
> Cezary and Amadeusz, could you please look into this 'make W=1' error?
...
> /data/pbossart/ktest/work/sound/soc/intel/avs/topology.c:9:
>
> In function ‘fortify_memcpy_chk’,
>
> inlined from ‘guid_copy’ at
> /data/pbossart/ktest/work/include/linux/uuid.h:43:2,
>
> inlined from ‘avs_parse_uuid_token’ at
> /data/pbossart/ktest/work/sound/soc/intel/avs/topology.c:134:2:
>
> /data/pbossart/ktest/work/include/linux/fortify-string.h:352:25: error:
> call to ‘__read_overflow2_field’ declared with attribute warning:
> detected read beyond size of field (2nd parameter); maybe use
> struct_group()? [-Werror=attribute-warning]
>
> 352 | __read_overflow2_field(q_size_field, size);
>
> | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> cc1: all warnings being treated as errors
Hello,
Thanks for the report! Already investigating, if all goes well patch
will be provided today.
Regards,
Czarek
More information about the Alsa-devel
mailing list