lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <c3a26623-c368-237a-3cc7-eed0879cee9e@infradead.org>
Date:   Sun, 23 Jul 2017 08:03:09 -0700
From:   Randy Dunlap <rdunlap@...radead.org>
To:     kbuild test robot <fengguang.wu@...el.com>,
        Al Viro <viro@...iv.linux.org.uk>
Cc:     kbuild-all@...org, linux-kernel@...r.kernel.org
Subject: Re: fs/binfmt_flat.c:828:9: error: void value not ignored as it ought
 to be

On 07/22/2017 10:35 PM, kbuild test robot wrote:
> Hi Al,
> 
> FYI, the error/warning still remains.
> 
> tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
> head:   4b162c530d9c101381500e586fedb1340595a6ff
> commit: 468138d78510688fb5476f98d23f11ac6a63229a binfmt_flat: flat_{get,put}_addr_from_rp() should be able to fail
> date:   3 weeks ago
> config: m32r-mappi.nommu_defconfig (attached as .config)
> compiler: m32r-linux-gcc (GCC) 6.2.0
> reproduce:
>         wget https://raw.githubusercontent.com/01org/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
>         chmod +x ~/bin/make.cross
>         git checkout 468138d78510688fb5476f98d23f11ac6a63229a
>         # save the attached .config to linux build tree
>         make.cross ARCH=m32r 
> 
> All errors (new ones prefixed by >>):
> 

>>> fs/binfmt_flat.c:828:9: error: void value not ignored as it ought to be
>         ret = flat_put_addr_at_rp(rp, addr, relval);
>             ^

m32r and microblaze have that function as void, while all others that
implement it have it as int.


-- 
~Randy

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ