public inbox for linux-crypto@vger.kernel.org
 help / color / mirror / Atom feed
* linux-next: build warning after merge of the crypto tree
@ 2025-10-20  3:07 Stephen Rothwell
  2025-10-21  4:07 ` [PATCH] KEYS: trusted: Pass argument by pointer in dump_options Herbert Xu
  0 siblings, 1 reply; 2+ messages in thread
From: Stephen Rothwell @ 2025-10-20  3:07 UTC (permalink / raw)
  To: Herbert Xu
  Cc: Meenakshi Aggarwal, Pankaj Gupta, Linux Crypto List,
	Linux Kernel Mailing List, Linux Next Mailing List

[-- Attachment #1: Type: text/plain, Size: 787 bytes --]

Hi all,

After merging the crypto tree, today's linux-next build (x86_64
allmodconfig) produced this warning:

security/keys/trusted-keys/trusted_caam.c: In function 'dump_options':
security/keys/trusted-keys/trusted_caam.c:37:20: note: the ABI of passing struct with a flexible array member has changed in GCC 4.4
   37 | static inline void dump_options(struct caam_pkey_info pkey_info)
      |                    ^~~~~~~~~~~~

Introduced by commit

  9eb25ca6c973 ("KEYS: trusted: caam based protected key")

I am not sure what to do about this.  It would be nice if we could
suppress the note as we do not support gcc 4.4 any more.  Otherwise,
I suspect that converting the pkey_info argument to a pointer will get
rid of the note.

-- 
Cheers,
Stephen Rothwell

[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 488 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2025-10-21  4:08 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-10-20  3:07 linux-next: build warning after merge of the crypto tree Stephen Rothwell
2025-10-21  4:07 ` [PATCH] KEYS: trusted: Pass argument by pointer in dump_options Herbert Xu

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox