Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp4244346rwl; Wed, 28 Dec 2022 01:10:10 -0800 (PST) X-Google-Smtp-Source: AMrXdXsAaHZVb/eFxoxsSkhpmcFfinrkJ+TrRP2jF70tpVGGuVZV6Sxp7G0sllN62yOzOZDpzTBR X-Received: by 2002:a05:6402:c95:b0:47a:9aef:8841 with SMTP id cm21-20020a0564020c9500b0047a9aef8841mr20145458edb.36.1672218610623; Wed, 28 Dec 2022 01:10:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672218610; cv=none; d=google.com; s=arc-20160816; b=L4AM3p0A7sIVrNFzKPnnOIKPIyh+3iK58b9dBbE9+dOaB5FAeFPEE2yZDVskZvr396 PlRnaRKcJGiaBV4vO4X97fHtocsfiZZ3VDO74qBY6TZy6luIPWOZGAIC4cGgp8K7B9T9 YrGL4vwh2aVaYMgjrpYm1Ya9v7FOEzJ8bKyTG9dgKmrHIDN5S8/IKDGRv2T69jRFD/+u 2OJP/MW/YgSqV35PHdpqU14Eejban82/woIyYuK4Dk1T3lzNYsNBgnIgQSFx090YYD+i Eqhim0qyZLE6ru31pyC85eiHQ1x+M3Z57DtuUD2jtNd+gLMaiP6oWPRI3vPxkFG+i5jM 46Fw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=gECJ/qprc05E5DktSoUZ3O9JTpyLOuz1Pgrzp/+VcOg=; b=UHrLMKH2Ylfr7ecdBuWngmwYu9vxfhjLmW2KD5EWTCUfqhZ6pVk7NrLczC4yMVCsDZ Ngi71Fis57+D383zVUjBABX2PNDLAmyKaHeiWb5TbVWFT+DZjrGJOfo2MjMRkUDeyrJz EI80heQiLEOFZGdYn/yHfQluclQ/TA5C3ZtEj+21bUqtDcXCMsRJ6Bz950VOw5V36jxK K+aGaNSqx/GnP3DEeSfvYo/RBhqJ1HSg/GI1tqPpWjqt6Z+kAyad4/W7MaNLHzA4I9i5 tl7IbRNFkBzbifp6hxCcO3opmMbFhyBRXgoMnJbGskSn2zxUyS1YuNt0PGwDn9OwOTSq jBZw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w18-20020a056402269200b0045782fcb80asi14118932edd.225.2022.12.28.01.09.38; Wed, 28 Dec 2022 01:10:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232743AbiL1ItW (ORCPT + 99 others); Wed, 28 Dec 2022 03:49:22 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52526 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232808AbiL1Is4 (ORCPT ); Wed, 28 Dec 2022 03:48:56 -0500 Received: from formenos.hmeau.com (helcar.hmeau.com [216.24.177.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B467CE72; Wed, 28 Dec 2022 00:46:53 -0800 (PST) Received: from loth.rohan.me.apana.org.au ([192.168.167.2]) by formenos.hmeau.com with smtp (Exim 4.94.2 #2 (Debian)) id 1pAS59-00BTqH-2k; Wed, 28 Dec 2022 16:46:40 +0800 Received: by loth.rohan.me.apana.org.au (sSMTP sendmail emulation); Wed, 28 Dec 2022 16:46:39 +0800 Date: Wed, 28 Dec 2022 16:46:39 +0800 From: Herbert Xu To: Uwe =?iso-8859-1?Q?Kleine-K=F6nig?= Cc: Horia =?utf-8?Q?Geant=C4=83?= , Gaurav Jain , Pankaj Gupta , linux-crypto@vger.kernel.org, kernel@pengutronix.de, "David S. Miller" , Kees Cook , kernel test robot , Anders Roxell , linux-kernel@vger.kernel.org, linux-hardening@vger.kernel.org Subject: [PATCH] crypto: caam - Avoid GCC memset bug warning Message-ID: References: <20221222162513.4021928-1-u.kleine-koenig@pengutronix.de> <20221223174719.4n6pmwio4zycj2qm@pengutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20221223174719.4n6pmwio4zycj2qm@pengutronix.de> X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Certain versions of gcc don't like the memcpy with a NULL dst (which only happens with a zero length). This only happens when debugging is enabled so add an if clause to work around these warnings. A similar warning used to be generated by sparse but that was fixed years ago. Link: https://lore.kernel.org/lkml/202210290446.qBayTfzl-lkp@intel.com Reported-by: kernel test robot Reported-by: Kees Cook Reported-by: Uwe Kleine-K�nig Signed-off-by: Herbert Xu diff --git a/drivers/crypto/caam/desc_constr.h b/drivers/crypto/caam/desc_constr.h index 62ce6421bb3f..824c94d44f94 100644 --- a/drivers/crypto/caam/desc_constr.h +++ b/drivers/crypto/caam/desc_constr.h @@ -163,7 +163,8 @@ static inline void append_data(u32 * const desc, const void *data, int len) { u32 *offset = desc_end(desc); - if (len) /* avoid sparse warning: memcpy with byte count of 0 */ + /* Avoid gcc warning: memcpy with data == NULL */ + if (!IS_ENABLED(CONFIG_CRYPTO_DEV_FSL_CAAM_DEBUG) || data) memcpy(offset, data, len); (*desc) = cpu_to_caam32(caam32_to_cpu(*desc) + -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt