powerpc/powernv: Fix fortify source warnings in opal-prd.c
authorMichael Ellerman <mpe@ellerman.id.au>
Mon, 21 Aug 2023 14:28:19 +0000 (00:28 +1000)
committerMichael Ellerman <mpe@ellerman.id.au>
Thu, 24 Aug 2023 12:33:04 +0000 (22:33 +1000)
commitfeea65a338e52297b68ceb688eaf0ffc50310a83
treed5b3ddfb3021a04af4b67e309f78b79970a6f441
parentc265735ff5b1f13272e2bfb196f5c55f9b3c9bac
powerpc/powernv: Fix fortify source warnings in opal-prd.c

As reported by Mahesh & Aneesh, opal_prd_msg_notifier() triggers a
FORTIFY_SOURCE warning:

  memcpy: detected field-spanning write (size 32) of single field "&item->msg" at arch/powerpc/platforms/powernv/opal-prd.c:355 (size 4)
  WARNING: CPU: 9 PID: 660 at arch/powerpc/platforms/powernv/opal-prd.c:355 opal_prd_msg_notifier+0x174/0x188 [opal_prd]
  NIP opal_prd_msg_notifier+0x174/0x188 [opal_prd]
  LR  opal_prd_msg_notifier+0x170/0x188 [opal_prd]
  Call Trace:
    opal_prd_msg_notifier+0x170/0x188 [opal_prd] (unreliable)
    notifier_call_chain+0xc0/0x1b0
    atomic_notifier_call_chain+0x2c/0x40
    opal_message_notify+0xf4/0x2c0

This happens because the copy is targeting item->msg, which is only 4
bytes in size, even though the enclosing item was allocated with extra
space following the msg.

To fix the warning define struct opal_prd_msg with a union of the header
and a flex array, and have the memcpy target the flex array.

Reported-by: "Aneesh Kumar K.V" <aneesh.kumar@linux.ibm.com>
Reported-by: Mahesh Salgaonkar <mahesh@linux.ibm.com>
Tested-by: Mahesh Salgaonkar <mahesh@linux.ibm.com>
Reviewed-by: Mahesh Salgaonkar <mahesh@linux.ibm.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://msgid.link/20230821142820.497107-1-mpe@ellerman.id.au
arch/powerpc/platforms/powernv/opal-prd.c