Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp4338794pxv; Tue, 29 Jun 2021 04:54:14 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzdzMgDkHVOAl4nA5prhixGAAVlWBJ5XQg4SQqVgjnmFwPdOvZDLSfXvuKKgZUogiaj9IJg X-Received: by 2002:a05:6e02:1a4d:: with SMTP id u13mr21018012ilv.42.1624967654511; Tue, 29 Jun 2021 04:54:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624967654; cv=none; d=google.com; s=arc-20160816; b=FHvelqJ6qbCOZSI2Itfc+W+lmDNRksRBmJHnUjmc3zgiQHqa+6Ol+o7wyIXFkzQuqi AVFYuukoANMzMnHgE1Zde3g3I9yhJBTObaT2RH5N32HIveEfBHQouDWyvRPVZbgXpJAs lYCvb/dsXIaRPQvXEEz3xFAtCPiMAbPMq8grbHVUts7TAqCrtutAMC3LmddVypvCTPIm NtCBhrJBtRZXCrNS5eFgahdiS72UaMq1bvNmEPAV5Efl9irLcLpyvdExdYmEhS1rqQTC Hy4eIspGny89sQ/aXbHQ7fCSdyZrx2K/2DYVL2ftAtDn5eICiwxfv1bMnCwIThzUkGLQ SfcA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:message-id:subject:cc:to :from:date; bh=iqp3XmHvgm73QiBpUMvzWj5sZGF2JnRGrapLF2Qqv1g=; b=IRBuwiY7wrov15GnpqyI5cPFs4F9qrzgdwkuzjBJECEVa9TW3FON4vUfgatB4asgSl l2d/JTYgWdmOhJVoWSO2hRYLmzIzh8889wClGvtaXFZxkDPddPWH7JI3PjVdZNqNI9yj 9eejW/G2WTi5opKNSBDrVusiorb6stAIHA/ufNt5aFh+23My/FfSpNRx1OaX1YBL+Vwc 01gdXUnACM1OPftZMMJnohRKy893gflheyn3Zua8RukWINLKN+0YkGZ7hlrOeHg5lJUH LhKk2ua8Cx8kNbUukcf6qAt6P0Pm3ve3dJsNq70SFr5U23GRd+Hch8MRZg4DdunbTLJB 60LQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i14si11539530ioi.87.2021.06.29.04.53.50; Tue, 29 Jun 2021 04:54:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232790AbhF2Lua (ORCPT + 99 others); Tue, 29 Jun 2021 07:50:30 -0400 Received: from mail2-relais-roc.national.inria.fr ([192.134.164.83]:16114 "EHLO mail2-relais-roc.national.inria.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232664AbhF2Lua (ORCPT ); Tue, 29 Jun 2021 07:50:30 -0400 X-IronPort-AV: E=Sophos;i="5.83,308,1616454000"; d="scan'208";a="517260400" Received: from 173.121.68.85.rev.sfr.net (HELO hadrien) ([85.68.121.173]) by mail2-relais-roc.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 29 Jun 2021 13:48:01 +0200 Date: Tue, 29 Jun 2021 13:48:01 +0200 (CEST) From: Julia Lawall X-X-Sender: jll@hadrien To: Megha Dey cc: labuser , Tomasz Kantecki , Herbert Xu , linux-crypto@vger.kernel.org, kbuild-all@lists.01.org Subject: [PATCH] crypto: fix flexible_array.cocci warnings Message-ID: User-Agent: Alpine 2.22 (DEB 394 2020-01-19) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org From: kernel test robot Zero-length and one-element arrays are deprecated, see Documentation/process/deprecated.rst Flexible-array members should be used instead. Generated by: scripts/coccinelle/misc/flexible_array.cocci Fixes: 7540b2861e52 ("crypto: aesni - AVX512 version of AESNI-GCM using VPCLMULQDQ") CC: Megha Dey Reported-by: kernel test robot Signed-off-by: kernel test robot Signed-off-by: Julia Lawall --- tree: https://github.com/meghadey/crypto for_crypto_avx512 head: a89c5880f0d6260dd593bf579df26f2a2d56ac32 commit: 7540b2861e5292b5993f8e693fc69510b2a7277a [5/6] crypto: aesni - AVX512 version of AESNI-GCM using VPCLMULQDQ :::::: branch date: 7 hours ago :::::: commit date: 7 hours ago aesni-intel_glue.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/arch/x86/crypto/aesni-intel_glue.c +++ b/arch/x86/crypto/aesni-intel_glue.c @@ -87,7 +87,7 @@ struct gcm_context_data { u64 partial_block_len; u64 unused; /* Allocate space for hash_keys later */ - u8 hash_keys[0]; + u8 hash_keys[]; }; asmlinkage int aesni_set_key(struct crypto_aes_ctx *ctx, const u8 *in_key,