aboutsummaryrefslogtreecommitdiff
path: root/drivers/nvme/target
diff options
context:
space:
mode:
authorGravatar Arnd Bergmann <arnd@arndb.de> 2024-01-03 16:56:56 +0100
committerGravatar Keith Busch <kbusch@kernel.org> 2024-01-05 13:16:18 -0800
commita7de1dea76cd6a3707707af4ea2f8bc3cdeaeb11 (patch)
tree62bb9a9405e9153cacf839a1457a3397061c2ed6 /drivers/nvme/target
parentnvmet: re-fix tracing strncpy() warning (diff)
downloadlinux-a7de1dea76cd6a3707707af4ea2f8bc3cdeaeb11.tar.gz
linux-a7de1dea76cd6a3707707af4ea2f8bc3cdeaeb11.tar.bz2
linux-a7de1dea76cd6a3707707af4ea2f8bc3cdeaeb11.zip
nvme: trace: avoid memcpy overflow warning
A previous patch introduced a struct_group() in nvme_common_command to help stringop fortification figure out the length of the fields, but one function is not currently using them: In file included from drivers/nvme/target/core.c:7: In file included from include/linux/string.h:254: include/linux/fortify-string.h:592:4: error: call to '__read_overflow2_field' declared with 'warning' attribute: detected read beyond size of field (2nd parameter); maybe use struct_group()? [-Werror,-Wattribute-warning] __read_overflow2_field(q_size_field, size); ^ Change this one to use the correct field name to avoid the warning. Fixes: 5c629dc9609dc ("nvme: use struct group for generic command dwords") Signed-off-by: Arnd Bergmann <arnd@arndb.de> Signed-off-by: Keith Busch <kbusch@kernel.org>
Diffstat (limited to 'drivers/nvme/target')
-rw-r--r--drivers/nvme/target/trace.h2
1 files changed, 1 insertions, 1 deletions
diff --git a/drivers/nvme/target/trace.h b/drivers/nvme/target/trace.h
index 89020018a0e3..7f7ebf9558e5 100644
--- a/drivers/nvme/target/trace.h
+++ b/drivers/nvme/target/trace.h
@@ -90,7 +90,7 @@ TRACE_EVENT(nvmet_req_init,
__entry->flags = cmd->common.flags;
__entry->nsid = le32_to_cpu(cmd->common.nsid);
__entry->metadata = le64_to_cpu(cmd->common.metadata);
- memcpy(__entry->cdw10, &cmd->common.cdw10,
+ memcpy(__entry->cdw10, &cmd->common.cdws,
sizeof(__entry->cdw10));
),
TP_printk("nvmet%s: %sqid=%d, cmdid=%u, nsid=%u, flags=%#x, "