Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp1067017pxv; Fri, 16 Jul 2021 00:27:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxd+0SZ7LXqaGIsW4muBR3U0HpT1YzgFm6Jr+cPKOHx+3pMMFdFEqmSqbwH7+glIa5/G3bl X-Received: by 2002:a50:8a89:: with SMTP id j9mr12540389edj.226.1626420444227; Fri, 16 Jul 2021 00:27:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626420444; cv=none; d=google.com; s=arc-20160816; b=mDJFUdKpE2+XQbuxfhjVGcCcIfcr6Apt/j1JgJHJrTOAAwkeNPzYiV5ic65uNSALWX /ooXOGwFPeRgvkDw951QfTqQiOaTZLXdUWrQ3xOhZmJKMAgLnqKB5+ld1fu/P/fHJe1l YtStHWTa7N9skzAJnbdmwBVWc/jzILX8jODuU9tOpcIl//v4Y1xN/9FWL06WBnjY56Tr asLMW+sUTj7+JTEXoiHkhD62bxe7lbd6orhRvvEy5kcQ286jbgLAM+CteW/hWLlP3cMo hmkGL1epEimOhuv4K4JPtsHdCwlB2TFi/rGvF/SYaTBkXX7LfrpT4gwMESaOc/HvOPps noag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=pc8f/73umHxxxu5ew5oiLmnU3CQQxl91Jlpnk6Bg3wg=; b=w5Gg9pUq4uX/jTAmGISsQ7qiDyYrq30Ux6IgPVutNJ0HT+6HMit11RBckCDS2iXfxp epu4gInj0JE+grfDPZ+uombaSu/M+UdfYEFfwsS+si2zdfeXW0bDtCkCWlKKhMQuXp8C JcckI8hNtHxTXRdJpsy+J6yoik8ekpmnbDgPqHPEpDmzWumSb2zVbbdeXuLQywstyoN0 iYYUJvMSxfVD+iuzezglDhq5BpF3pOIukIzNwjV0pcwttNGJsEVg/cr3e1IhW7vh5aHq CFP6/TGm+qh5wu3Ml9v/QxQQuMsVrL8BvwL3EHVP4TX1EuDK+xPwFs3kD+iVGW/xfvLX 7UYg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id eg32si10110668edb.591.2021.07.16.00.26.53; Fri, 16 Jul 2021 00:27:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235441AbhGPH33 (ORCPT + 99 others); Fri, 16 Jul 2021 03:29:29 -0400 Received: from helcar.hmeau.com ([216.24.177.18]:51394 "EHLO deadmen.hmeau.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231737AbhGPH32 (ORCPT ); Fri, 16 Jul 2021 03:29:28 -0400 Received: from gondobar.mordor.me.apana.org.au ([192.168.128.4] helo=gondobar) by deadmen.hmeau.com with esmtp (Exim 4.92 #5 (Debian)) id 1m4IEu-0004op-4f; Fri, 16 Jul 2021 15:26:28 +0800 Received: from herbert by gondobar with local (Exim 4.92) (envelope-from ) id 1m4IEn-0001yK-8D; Fri, 16 Jul 2021 15:26:21 +0800 Date: Fri, 16 Jul 2021 15:26:21 +0800 From: Herbert Xu To: Julia Lawall Cc: Megha Dey , labuser , Tomasz Kantecki , linux-crypto@vger.kernel.org, kbuild-all@lists.01.org Subject: Re: [PATCH] crypto: fix flexible_array.cocci warnings Message-ID: <20210716072621.GA7555@gondor.apana.org.au> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org On Tue, Jun 29, 2021 at 01:48:01PM +0200, Julia Lawall wrote: > From: kernel test robot > > Zero-length and one-element arrays are deprecated, see > Documentation/process/deprecated.rst > Flexible-array members should be used instead. > > Generated by: scripts/coccinelle/misc/flexible_array.cocci > > Fixes: 7540b2861e52 ("crypto: aesni - AVX512 version of AESNI-GCM using VPCLMULQDQ") > CC: Megha Dey > Reported-by: kernel test robot > Signed-off-by: kernel test robot > Signed-off-by: Julia Lawall > --- > > tree: https://github.com/meghadey/crypto for_crypto_avx512 > head: a89c5880f0d6260dd593bf579df26f2a2d56ac32 > commit: 7540b2861e5292b5993f8e693fc69510b2a7277a [5/6] crypto: aesni - AVX512 version of AESNI-GCM using VPCLMULQDQ > :::::: branch date: 7 hours ago > :::::: commit date: 7 hours ago > > aesni-intel_glue.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > --- a/arch/x86/crypto/aesni-intel_glue.c > +++ b/arch/x86/crypto/aesni-intel_glue.c > @@ -87,7 +87,7 @@ struct gcm_context_data { > u64 partial_block_len; > u64 unused; > /* Allocate space for hash_keys later */ > - u8 hash_keys[0]; > + u8 hash_keys[]; Unfortunately this patch doesn't apply to the current crypto tree. But the good news is that the current tree no longer has a zero- length array in that struct. Thanks, -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt