1. 18 May, 2020 8 commits
  2. 15 May, 2020 4 commits
  3. 14 May, 2020 4 commits
  4. 13 May, 2020 2 commits
  5. 12 May, 2020 18 commits
  6. 11 May, 2020 2 commits
  7. 08 May, 2020 2 commits
    • Arnd Bergmann's avatar
      ASoC: cros_ec_codec: allocate shash_desc dynamically · a1304cba
      Arnd Bergmann authored
      The wov_hotword_model_put() function has multiple large variables on
      its stack, the largest of which is the result of SHASH_DESC_ON_STACK().
      In total, this exceeds the warning limit for 32-bit architectures:
      
      sound/soc/codecs/cros_ec_codec.c:776:12: error: stack frame size of 1152 bytes in function 'wov_hotword_model_put' [-Werror,-Wframe-larger-than=]
      
      The function already has a dynamic crypto_alloc_shash() allocation, so
      using kmalloc() for the descriptor is correct as well and does not
      introduce any additional failure scenarios. With this, the stack usage
      of wov_hotword_model_put() gets reduced to 480 bytes in my test
      configuration.
      
      Fixes: b6bc07d4 ("ASoC: cros_ec_codec: support WoV")
      Signed-off-by: default avatarArnd Bergmann <arnd@arndb.de>
      Reviewed-by: default avatarTzung-Bi Shih <tzungbi@google.com>
      Link: https://lore.kernel.org/r/20200507213405.1869430-1-arnd@arndb.deSigned-off-by: default avatarMark Brown <broonie@kernel.org>
      a1304cba
    • Gustavo A. R. Silva's avatar
      ASoC: soc-core: Replace zero-length array with flexible-array · 2d6201ee
      Gustavo A. R. Silva authored
      The current codebase makes use of the zero-length array language
      extension to the C90 standard, but the preferred mechanism to declare
      variable-length types such as these ones is a flexible array member[1][2],
      introduced in C99:
      
      struct foo {
              int stuff;
              struct boo array[];
      };
      
      By making use of the mechanism above, we will get a compiler warning
      in case the flexible array does not occur last in the structure, which
      will help us prevent some kind of undefined behavior bugs from being
      inadvertently introduced[3] to the codebase from now on.
      
      Also, notice that, dynamic memory allocations won't be affected by
      this change:
      
      "Flexible array members have incomplete type, and so the sizeof operator
      may not be applied. As a quirk of the original implementation of
      zero-length arrays, sizeof evaluates to zero."[1]
      
      sizeof(flexible-array-member) triggers a warning because flexible array
      members have incomplete type[1]. There are some instances of code in
      which the sizeof operator is being incorrectly/erroneously applied to
      zero-length arrays and the result is zero. Such instances may be hiding
      some bugs. So, this work (flexible-array member conversions) will also
      help to get completely rid of those sorts of issues.
      
      This issue was found with the help of Coccinelle.
      
      [1] https://gcc.gnu.org/onlinedocs/gcc/Zero-Length.html
      [2] https://github.com/KSPP/linux/issues/21
      [3] commit 76497732 ("cxgb3/l2t: Fix undefined behaviour")
      Signed-off-by: default avatarGustavo A. R. Silva <gustavoars@kernel.org>
      Link: https://lore.kernel.org/r/20200507192228.GA16355@embeddedorSigned-off-by: default avatarMark Brown <broonie@kernel.org>
      2d6201ee