Centos-kernel-stream-9/tools
Ivan Vecera b2921ef0bb treewide: uapi: Replace zero-length arrays with flexible-array members
Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2172886

Conflicts:
- only TC related headers

commit 94dfc73e7cf4a31da66b8843f0b9283ddd6b8381
Author: Gustavo A. R. Silva <gustavoars@kernel.org>
Date:   Wed Apr 6 19:36:51 2022 -0500

    treewide: uapi: Replace zero-length arrays with flexible-array members

    There is a regular need in the kernel to provide a way to declare
    having a dynamically sized set of trailing elements in a structure.
    Kernel code should always use “flexible array members”[1] for these
    cases. The older style of one-element or zero-length arrays should
    no longer be used[2].

    This code was transformed with the help of Coccinelle:
    (linux-5.19-rc2$ spatch --jobs $(getconf _NPROCESSORS_ONLN) --sp-file script.cocci --include-headers --dir . > output.patch)

    @@
    identifier S, member, array;
    type T1, T2;
    @@

    struct S {
      ...
      T1 member;
      T2 array[
    - 0
      ];
    };

    -fstrict-flex-arrays=3 is coming and we need to land these changes
    to prevent issues like these in the short future:

    ../fs/minix/dir.c:337:3: warning: 'strcpy' will always overflow; destination buffer has size 0,
    but the source string has length 2 (including NUL byte) [-Wfortify-source]
                    strcpy(de3->name, ".");
                    ^

    Since these are all [0] to [] changes, the risk to UAPI is nearly zero. If
    this breaks anything, we can use a union with a new member name.

    [1] https://en.wikipedia.org/wiki/Flexible_array_member
    [2] https://www.kernel.org/doc/html/v5.16/process/deprecated.html#zero-length-and-one-element-arrays

    Link: https://github.com/KSPP/linux/issues/78
    Build-tested-by: kernel test robot <lkp@intel.com>
    Link: https://lore.kernel.org/lkml/62b675ec.wKX6AOZ6cbE71vtF%25lkp@intel.com/
    Acked-by: Dan Williams <dan.j.williams@intel.com> # For ndctl.h
    Signed-off-by: Gustavo A. R. Silva <gustavoars@kernel.org>

Signed-off-by: Ivan Vecera <ivecera@redhat.com>
2023-05-10 20:48:39 +02:00
..
accounting delayacct: track delays from write-protect copy 2023-03-24 11:19:12 -04:00
arch tools arch x86: Sync the msr-index.h copy with the kernel sources 2023-04-28 10:16:09 -04:00
bootconfig
bpf bpftool: Fix NULL pointer dereference when pin {PROG, MAP, LINK} without FILE 2023-03-06 14:54:21 +01:00
build
cgroup
debugging tools: Add new "test" taint to kernel-chktaint 2023-04-17 11:47:38 -06:00
edid
firewire
firmware
gpio
hv
iio
include treewide: uapi: Replace zero-length arrays with flexible-array members 2023-05-10 20:48:39 +02:00
io_uring
kvm/kvm_stat
laptop
leds
lib lib/bitmap: change type of bitmap_weight to unsigned long 2023-03-30 10:24:32 -04:00
memory-model
objtool ftrace: Add HAVE_DYNAMIC_FTRACE_NO_PATCHABLE 2023-03-06 14:54:12 +01:00
pci
pcmcia
perf perf stat: Support old kernels for bperf cgroup counting 2023-03-06 14:54:27 +01:00
power tools/power turbostat: Add support for MeteorLake platforms 2023-03-13 07:51:34 -04:00
rcu
scripts
spi
testing Merge: KVM: aarch64: Rebase (first round towards v6.3) 2023-05-10 10:51:45 +02:00
thermal/tmon
time
tracing
usb
verification
virtio
vm docs: rename Documentation/vm to Documentation/mm 2023-03-24 11:19:15 -04:00
wmi
Makefile