Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp1671246ybk; Mon, 11 May 2020 01:19:29 -0700 (PDT) X-Google-Smtp-Source: APiQypLXrp9MWhs/7Jcnlgq9FQOVR3qEWgBfxFEOpxvuQNQTV1g6idLIxN0TK01NAZR7SqwoQ511 X-Received: by 2002:a50:bb6b:: with SMTP id y98mr11931266ede.296.1589185169482; Mon, 11 May 2020 01:19:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589185169; cv=none; d=google.com; s=arc-20160816; b=haBuZodhmYrhZbX7cGigE+2ipANU6UzgfR86rY1wEhlj1gdOaWfsoOjo34Q+58xk3v G/ByBYoGynr2LHmaU1iyysZWwaWrDYe/Bddl+tqhdy+tPcDxMTMxCtfmd7DJncBRiAbO NbOdnvRw8osJzRhmXTtUs9NjdV+Niku9z7wqkdIu+lShn5OWfVCB8/8BzBOgD7z+ejS0 GLIAG1PPoeQno8oJV8ObKSWnc2cNqqF6SfOtXw/iidHfeFtoT5wI5suuY1MfYL+aEa7l fyepYy3NuzxcZ3SyBwBHjpzyTjfTNkGKBhDIf4l8jvjT3QM56g6Vm3+KRRDcTAht2F/e +tLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=llxgYxDjK3bAUwJ1DubU+fxbSZ/Tj8vPyRBfEf4Kjys=; b=X8Z00qXAIA8/c8oCx4AIjXbA9J8tzXUvdlxBE2XJ0HUyLuZLO3ZAP40mXVvyBBNJBO ETObY98GOwmFESFwU9y37IYVOisbNTNh0J+pUNbIkinkjE0ZT15MtX6DxBCSto9T3zPl NuLMsJ9rkGjYtdzgmuiipz/Lhnawl69AJOvwwvZH7hwgNL123UnZx/mzHHkMZsnUEf0R lJbobrFTWT6/eK+/oylij+z7OP1Bb6KL4ycU1YG3tOy+5vtvHTzaHCA3B75yXKqzxzls 9VF31tLZLVmUl19cI2yVB93VnScSZT24lT6z6yNqIXwcy8QAbkcp0Pno0s+aBi92qE0s NHqA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cd12si5318245ejb.351.2020.05.11.01.19.06; Mon, 11 May 2020 01:19:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728857AbgEKIPY (ORCPT + 99 others); Mon, 11 May 2020 04:15:24 -0400 Received: from lhrrgout.huawei.com ([185.176.76.210]:2182 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728367AbgEKIPY (ORCPT ); Mon, 11 May 2020 04:15:24 -0400 Received: from lhreml724-chm.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 88503DC328FCC81CA376; Mon, 11 May 2020 09:15:22 +0100 (IST) Received: from [127.0.0.1] (10.47.0.142) by lhreml724-chm.china.huawei.com (10.201.108.75) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.1913.5; Mon, 11 May 2020 09:15:21 +0100 Subject: Re: [PATCH] scsi: libsas: Replace zero-length array with flexible-array To: "Gustavo A. R. Silva" , "James E.J. Bottomley" , "Martin K. Petersen" CC: , , Arnd Bergmann References: <20200507192147.GA16206@embeddedor> From: John Garry Message-ID: Date: Mon, 11 May 2020 09:14:31 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.1.2 MIME-Version: 1.0 In-Reply-To: <20200507192147.GA16206@embeddedor> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.47.0.142] X-ClientProxiedBy: lhreml705-chm.china.huawei.com (10.201.108.54) To lhreml724-chm.china.huawei.com (10.201.108.75) X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 07/05/2020 20:21, Gustavo A. R. Silva wrote: > The current codebase makes use of the zero-length array language > extension to the C90 standard, but the preferred mechanism to declare > variable-length types such as these ones is a flexible array member[1][2], > introduced in C99: > > struct foo { > int stuff; > struct boo array[]; > }; > > By making use of the mechanism above, we will get a compiler warning > in case the flexible array does not occur last in the structure, which > will help us prevent some kind of undefined behavior bugs from being > inadvertently introduced[3] to the codebase from now on. > > Also, notice that, dynamic memory allocations won't be affected by > this change: > > "Flexible array members have incomplete type, and so the sizeof operator > may not be applied. As a quirk of the original implementation of > zero-length arrays, sizeof evaluates to zero."[1] > > sizeof(flexible-array-member) triggers a warning because flexible array > members have incomplete type[1]. There are some instances of code in > which the sizeof operator is being incorrectly/erroneously applied to > zero-length arrays and the result is zero. Such instances may be hiding > some bugs. So, this work (flexible-array member conversions) will also > help to get completely rid of those sorts of issues. > > This issue was found with the help of Coccinelle. > > [1] https://gcc.gnu.org/onlinedocs/gcc/Zero-Length.html > [2] https://github.com/KSPP/linux/issues/21 > [3] commit 76497732932f ("cxgb3/l2t: Fix undefined behaviour") > > Signed-off-by: Gustavo A. R. Silva Reviewed-by: John Garry > --- > drivers/scsi/aic94xx/aic94xx_sds.c | 14 +++++++------- > include/scsi/sas.h | 8 ++++---- > 2 files changed, 11 insertions(+), 11 deletions(-) > > diff --git a/drivers/scsi/aic94xx/aic94xx_sds.c b/drivers/scsi/aic94xx/aic94xx_sds.c > index 3ddc8852bc32..105adba559a1 100644 > --- a/drivers/scsi/aic94xx/aic94xx_sds.c > +++ b/drivers/scsi/aic94xx/aic94xx_sds.c > @@ -406,7 +406,7 @@ struct asd_manuf_sec { > u8 sas_addr[SAS_ADDR_SIZE]; > u8 pcba_sn[ASD_PCBA_SN_SIZE]; > /* Here start the other segments */ > - u8 linked_list[0]; > + u8 linked_list[]; > } __attribute__ ((packed)); > > struct asd_manuf_phy_desc { > @@ -449,7 +449,7 @@ struct asd_ms_sb_desc { > u8 type; > u8 node_desc_index; > u8 conn_desc_index; > - u8 _recvd[0]; > + u8 _recvd[]; > } __attribute__ ((packed)); > > #if 0 > @@ -478,12 +478,12 @@ struct asd_ms_conn_desc { > u8 size_sideband_desc; > u32 _resvd; > u8 name[16]; > - struct asd_ms_sb_desc sb_desc[0]; > + struct asd_ms_sb_desc sb_desc[]; > } __attribute__ ((packed)); > > struct asd_nd_phy_desc { > u8 vp_attch_type; > - u8 attch_specific[0]; > + u8 attch_specific[]; > } __attribute__ ((packed)); > > #if 0 > @@ -503,7 +503,7 @@ struct asd_ms_node_desc { > u8 size_phy_desc; > u8 _resvd; > u8 name[16]; > - struct asd_nd_phy_desc phy_desc[0]; > + struct asd_nd_phy_desc phy_desc[]; > } __attribute__ ((packed)); > > struct asd_ms_conn_map { > @@ -518,7 +518,7 @@ struct asd_ms_conn_map { > u8 usage_model_id; > u32 _resvd; > struct asd_ms_conn_desc conn_desc[0]; > - struct asd_ms_node_desc node_desc[0]; > + struct asd_ms_node_desc node_desc[]; > } __attribute__ ((packed)); > > struct asd_ctrla_phy_entry { > @@ -542,7 +542,7 @@ struct asd_ll_el { > u8 id0; > u8 id1; > __le16 next; > - u8 something_here[0]; > + u8 something_here[]; > } __attribute__ ((packed)); > > static int asd_poll_flash(struct asd_ha_struct *asd_ha) > diff --git a/include/scsi/sas.h b/include/scsi/sas.h > index a5d8ae49198c..4726c1bbec65 100644 > --- a/include/scsi/sas.h > +++ b/include/scsi/sas.h > @@ -324,7 +324,7 @@ struct ssp_response_iu { > __be32 response_data_len; > > u8 resp_data[0]; JFYI, We still have a zero-length array here, and some ideas to remove it are here: https://lore.kernel.org/linux-scsi/CAK8P3a1=5dmgB+k9B_jk2qBhBPnMSFMWrByP4jRvyvaJwBo94A@mail.gmail.com/ > - u8 sense_data[0]; > + u8 sense_data[]; > } __attribute__ ((packed)); > > struct ssp_command_iu { > @@ -346,7 +346,7 @@ struct ssp_command_iu { > u8 add_cdb_len:6; > > u8 cdb[16]; > - u8 add_cdb[0]; > + u8 add_cdb[]; > } __attribute__ ((packed)); > > struct xfer_rdy_iu { > @@ -555,7 +555,7 @@ struct ssp_response_iu { > __be32 response_data_len; > > u8 resp_data[0]; > - u8 sense_data[0]; > + u8 sense_data[]; > } __attribute__ ((packed)); > > struct ssp_command_iu { > @@ -577,7 +577,7 @@ struct ssp_command_iu { > u8 _r_c:2; > > u8 cdb[16]; > - u8 add_cdb[0]; > + u8 add_cdb[]; > } __attribute__ ((packed)); > > struct xfer_rdy_iu { > > . >