From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 339B8A00BE; Tue, 14 Jun 2022 11:45:22 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 2546040DDD; Tue, 14 Jun 2022 11:45:22 +0200 (CEST) Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by mails.dpdk.org (Postfix) with ESMTP id 5D8F340C35 for ; Tue, 14 Jun 2022 11:45:20 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1655199920; x=1686735920; h=date:from:to:cc:subject:message-id:references: mime-version:content-transfer-encoding:in-reply-to; bh=DUpJ23HkuI4lPC1Tdy+yr3sn5zKAldx3/Bi5XwGhBD4=; b=TbCAoRLBXS4ewlC3uh7E825AIESMT82pSRNgZt42JO2BzzNpkx/Q3/wO yn0kkCzHZrYkAJ4P0WnNszJ/NhtDM7mvYtZlsd9z0MKF2iN042Ut2YMLx 2BWlcRdBHramIHl+9wVUPIw0wLezyDP44uWEB17n30MX3Jnf6cyaTqlsi VruPgBA9xVT/1XNAtb0VpNVdz0b5Q52W72bTN5coleXwmYATxZ7+3GaVD 4q/7MTS9WYRx6Vz6sVHVOuEo4eq7/WLHlB1iHP0ZdfU2BYZvKcqdo9dXh 0VCYjmhkF0hPJ1XGb1KsERfnkvJTaGL0b9k1ebOUpM9dijA3A6g1be6DF Q==; X-IronPort-AV: E=McAfee;i="6400,9594,10377"; a="276107829" X-IronPort-AV: E=Sophos;i="5.91,299,1647327600"; d="scan'208";a="276107829" Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 14 Jun 2022 02:45:19 -0700 X-IronPort-AV: E=Sophos;i="5.91,299,1647327600"; d="scan'208";a="830318600" Received: from bricha3-mobl.ger.corp.intel.com ([10.55.133.106]) by fmsmga006-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-SHA; 14 Jun 2022 02:45:17 -0700 Date: Tue, 14 Jun 2022 10:45:14 +0100 From: Bruce Richardson To: Stephen Hemminger Cc: dev@dpdk.org, david.marchand@redhat.com, ktraynor@redhat.com, jingjing.wu@intel.com, beilei.xing@intel.com Subject: Re: [PATCH 0/4] clean up zero-length arrays Message-ID: References: <20220602150834.643745-1-bruce.richardson@intel.com> <20220608082302.09de7deb@hermes.local> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org On Tue, Jun 14, 2022 at 10:40:50AM +0100, Bruce Richardson wrote: > On Wed, Jun 08, 2022 at 08:23:02AM -0700, Stephen Hemminger wrote: > > On Thu, 2 Jun 2022 16:08:30 +0100 > > Bruce Richardson wrote: > > > > > This patchset adds a coccinelle script to clean-up zero-length > > > arrays in structures. The final patches are the result of running > > > that script on the DPDK repository. > > > > > > Bruce Richardson (4): > > > cocci: add script for zero-length arrays in structs > > > drivers: replace zero-length arrays with undimensioned ones > > > lib: replace zero-length arrays with undimensioned ones > > > app: examples: replace zero-length arrays with undimensioned ones > > > > > > app/test/test_table_tables.c | 2 +- > > > devtools/cocci/zero_length_array.cocci | 21 +++++++++++++++ > > > drivers/bus/dpaa/include/netcfg.h | 4 +-- > > > drivers/bus/vmbus/rte_vmbus_reg.h | 4 +-- > > > drivers/common/cnxk/roc_se.h | 2 +- > > > drivers/common/dpaax/caamflib/desc/ipsec.h | 2 +- > > > drivers/common/dpaax/dpaax_iova_table.h | 2 +- > > > drivers/common/mlx5/mlx5_prm.h | 10 +++---- > > > drivers/crypto/ipsec_mb/ipsec_mb_private.h | 4 +-- > > > drivers/crypto/virtio/virtio_ring.h | 4 +-- > > > drivers/crypto/virtio/virtqueue.h | 2 +- > > > drivers/net/atlantic/hw_atl/hw_atl_utils.h | 2 +- > > > drivers/net/cxgbe/clip_tbl.h | 2 +- > > > drivers/net/cxgbe/l2t.h | 2 +- > > > drivers/net/cxgbe/mps_tcam.h | 2 +- > > > drivers/net/cxgbe/smt.h | 2 +- > > > drivers/net/enic/base/vnic_devcmd.h | 2 +- > > > drivers/net/hinic/hinic_pmd_tx.h | 2 +- > > > drivers/net/mlx5/mlx5_tx.h | 2 +- > > > drivers/net/nfp/nfpcore/nfp_nsp.h | 2 +- > > > drivers/net/virtio/virtio_ring.h | 4 +-- > > > drivers/net/virtio/virtio_user/vhost_kernel.c | 2 +- > > > drivers/net/virtio/virtio_user/vhost_vdpa.c | 2 +- > > > drivers/net/virtio/virtqueue.h | 2 +- > > > drivers/regex/mlx5/mlx5_rxp.h | 4 +-- > > > examples/ip_reassembly/main.c | 2 +- > > > examples/ptpclient/ptpclient.c | 4 +-- > > > lib/cryptodev/cryptodev_pmd.h | 2 +- > > > lib/cryptodev/rte_cryptodev.h | 2 +- > > > lib/eventdev/rte_event_timer_adapter.h | 2 +- > > > lib/ip_frag/ip_reassembly.h | 2 +- > > > lib/ipsec/sa.h | 2 +- > > > lib/rib/rte_rib.c | 2 +- > > > lib/rib/rte_rib6.c | 2 +- > > > lib/table/rte_swx_table_learner.c | 4 +-- > > > lib/table/rte_table_hash_key16.c | 4 +-- > > > lib/table/rte_table_hash_key32.c | 4 +-- > > > lib/table/rte_table_hash_key8.c | 4 +-- > > > lib/vhost/rte_vhost.h | 4 +-- > > > 40 files changed, 101 insertions(+), 54 deletions(-) > > > create mode 100644 devtools/cocci/zero_length_array.cocci > > > create mode 100644 lib/count_comments.py > > > > > > -- > > > 2.34.1 > > > > > > > Bruce, looking at this commit, it looks like the underlying cause > > of the problem with iavf was it is using array size of one > > when flex array should be used: > > > > commit b5b3ea803e4741ad6a46a38d8227c78226d9054d > > Author: Kevin Traynor > > Date: Fri Apr 17 16:43:35 2020 +0100 > > > > eal/x86: ignore gcc 10 stringop-overflow warnings > > > > stringop-overflow warns when it sees a possible overflow > > in a string operation. > > > > In the rte_memcpy functions different branches are taken > > depending on the size. stringop-overflow is raised for the > > branches in the function where it sees the static size of the > > src could be overflowed. > > > > However, in reality a correct size argument and in some cases > > dynamic allocation would ensure that this does not happen. > > > > For example, in the case below for key, the correct path will be > > chosen in rte_memcpy_generic at runtime based on the size argument > > but as some paths in the function could lead to a cast to 32 bytes > > a warning is raised. > > > > In function ‘_mm256_storeu_si256’, > > inlined from ‘rte_memcpy_generic’ > > at ../lib/librte_eal/common/include/arch/x86/rte_memcpy.h:315:2, > > inlined from ‘iavf_configure_rss_key’ > > at ../lib/librte_eal/common/include/arch/x86/rte_memcpy.h:869:10: > > > > /usr/lib/gcc/x86_64-redhat-linux/10/include/avxintrin.h:928:8: > > warning: writing 32 bytes into a region of size 1 [-Wstringop-overflow=] > > 928 | *__P = __A; > > | ~~~~~^~~~~ > > In file included > > from ../drivers/net/iavf/../../common/iavf/iavf_prototype.h:10, > > from ../drivers/net/iavf/iavf.h:9, > > from ../drivers/net/iavf/iavf_vchnl.c:22: > > > > ../drivers/net/iavf/iavf_vchnl.c: > > In function ‘iavf_configure_rss_key’: > > > > ../drivers/net/iavf/../../common/iavf/virtchnl.h:508:5: > > note: at offset 0 to object ‘key’ with size 1 declared here > > 508 | u8 key[1]; /* RSS hash key, packed bytes */ > > | ^~~ > > > > I would tend to agree with your assessment. It looks like the "u8 key[1]" > value should probably be "u8 key[]", and also in the following structure in > the file, "u8 lut[1]" should probably be "u8 lut[]". > > Adding maintainers for driver on CC > > Beilei, Jingjing, > > in "common/iavf/virtchnl.h", there are quite a number of values at the end > of structs which are defined as arrays of size 1. We suspect that many of > these are placeholder arrays which should be given as unsigned arrays. Is > this assessment correct? > s/unsigned arrays/flexible array members/ i.e. arrays without a given size "[]"