lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202007061550.RKN1KQQU%lkp@intel.com>
Date:   Mon, 6 Jul 2020 15:56:33 +0800
From:   kernel test robot <lkp@...el.com>
To:     Ioana Ciornei <ioana.ciornei@....com>
Cc:     kbuild-all@...ts.01.org, linux-kernel@...r.kernel.org,
        Andrew Lunn <andrew@...n.ch>
Subject: drivers/net/ethernet/freescale/dpaa2/dpmac.c:180:18: sparse: sparse:
 cast to restricted __le64

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head:   dcb7fd82c75ee2d6e6f9d8cc71c52519ed52e258
commit: 991df1fbb0dc3b44a88b4775b32d95839bf779e6 dpaa2-eth: add ethtool MAC counters
date:   8 months ago
config: arm64-randconfig-s032-20200706 (attached as .config)
compiler: aarch64-linux-gcc (GCC) 9.3.0
reproduce:
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # apt-get install sparse
        # sparse version: v0.6.2-14-g8fce3d7a-dirty
        git checkout 991df1fbb0dc3b44a88b4775b32d95839bf779e6
        # save the attached .config to linux build tree
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-9.3.0 make.cross C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' ARCH=arm64 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@...el.com>


sparse warnings: (new ones prefixed by >>)

>> drivers/net/ethernet/freescale/dpaa2/dpmac.c:180:18: sparse: sparse: cast to restricted __le64

vim +180 drivers/net/ethernet/freescale/dpaa2/dpmac.c

   150	
   151	/**
   152	 * dpmac_get_counter() - Read a specific DPMAC counter
   153	 * @mc_io:	Pointer to opaque I/O object
   154	 * @cmd_flags:	Command flags; one or more of 'MC_CMD_FLAG_'
   155	 * @token:	Token of DPMAC object
   156	 * @id:		The requested counter ID
   157	 * @value:	Returned counter value
   158	 *
   159	 * Return:	The requested counter; '0' otherwise.
   160	 */
   161	int dpmac_get_counter(struct fsl_mc_io *mc_io, u32 cmd_flags, u16 token,
   162			      enum dpmac_counter_id id, u64 *value)
   163	{
   164		struct dpmac_cmd_get_counter *dpmac_cmd;
   165		struct dpmac_rsp_get_counter *dpmac_rsp;
   166		struct fsl_mc_command cmd = { 0 };
   167		int err = 0;
   168	
   169		cmd.header = mc_encode_cmd_header(DPMAC_CMDID_GET_COUNTER,
   170						  cmd_flags,
   171						  token);
   172		dpmac_cmd = (struct dpmac_cmd_get_counter *)cmd.params;
   173		dpmac_cmd->id = id;
   174	
   175		err = mc_send_command(mc_io, &cmd);
   176		if (err)
   177			return err;
   178	
   179		dpmac_rsp = (struct dpmac_rsp_get_counter *)cmd.params;
 > 180		*value = le64_to_cpu(dpmac_rsp->counter);

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

Download attachment ".config.gz" of type "application/gzip" (35984 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ