Re: [PATCH] crypto: caam - Avoid GCC memset bug warning

From: Uwe Kleine-König
Date: Wed Dec 28 2022 - 04:39:44 EST


On Wed, Dec 28, 2022 at 04:46:39PM +0800, Herbert Xu wrote:
> Certain versions of gcc don't like the memcpy with a NULL dst
> (which only happens with a zero length). This only happens
> when debugging is enabled so add an if clause to work around
> these warnings.
>
> A similar warning used to be generated by sparse but that was
> fixed years ago.
>
> Link: https://lore.kernel.org/lkml/202210290446.qBayTfzl-lkp@xxxxxxxxx
> Reported-by: kernel test robot <lkp@xxxxxxxxx>
> Reported-by: Kees Cook <keescook@xxxxxxxxxxxx>
> Reported-by: Uwe Kleine-K�nig <u.kleine-koenig@xxxxxxxxxxxxxx>

Huh, broken encoding in the mail. I'd appreciate someone to doublecheck
it's fine in the final commit.

Tested-by: Uwe Kleine-König <u.kleine-koenig@xxxxxxxxxxxxxx>

Best regards
Uwe

--
Pengutronix e.K. | Uwe Kleine-König |
Industrial Linux Solutions | https://www.pengutronix.de/ |

Attachment: signature.asc
Description: PGP signature