lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20121229080742.GD18903@elie.Belkin> Date: Sat, 29 Dec 2012 00:07:43 -0800 From: Jonathan Nieder <jrnieder@...il.com> To: Ben Hutchings <ben@...adent.org.uk> Cc: linux-kernel@...r.kernel.org, stable@...r.kernel.org, akpm@...ux-foundation.org, alan@...rguk.ukuu.org.uk, Kees Cook <keescook@...omium.org>, Fengguang Wu <fengguang.wu@...el.com>, David Howells <dhowells@...hat.com>, Linus Torvalds <torvalds@...ux-foundation.org> Subject: Re: [ 016/173] use clamp_t in UNAME26 fix Ben Hutchings wrote: > The min/max call needed to have explicit types on some architectures > (e.g. mn10300). Use clamp_t instead to avoid the warning: > > kernel/sys.c: In function 'override_release': > kernel/sys.c:1287:10: warning: comparison of distinct pointer types lacks a cast [enabled by default] > > Reported-by: Fengguang Wu <fengguang.wu@...el.com> [...] > - copy = min(sizeof(buf), max_t(size_t, 1, len)); I don't understand how this happens given that v2.6.36-rc1~68 (MN10300: Fix size_t and ssize_t, 2010-08-12) was supposed to fix this kind of thing. Doesn't sizeof(buf) have type size_t already (C99 §6.5.3.4 "the sizeof operator" ¶4)? What version of gcc produces this warning? Puzzled, Jonathan -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists