lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <nycvar.YFH.7.76.2107271222500.8253@cbobk.fhfr.pm>
Date:   Tue, 27 Jul 2021 12:23:09 +0200 (CEST)
From:   Jiri Kosina <jikos@...nel.org>
To:     Michael Zaidman <michael.zaidman@...il.com>
cc:     kernel test robot <lkp@...el.com>,
        clang-built-linux@...glegroups.com, kbuild-all@...ts.01.org,
        linux-kernel@...r.kernel.org
Subject: Re: drivers/hid/hid-ft260.c:794:44: warning: format specifies type
 'short' but the argument has type 'int'

On Mon, 26 Jul 2021, Michael Zaidman wrote:

> > vim +794 drivers/hid/hid-ft260.c
> > 
> >    784	
> >    785	static int ft260_word_show(struct hid_device *hdev, int id, u8 *cfg, int len,
> >    786				   u16 *field, u8 *buf)
> >    787	{
> >    788		int ret;
> >    789	
> >    790		ret = ft260_hid_feature_report_get(hdev, id, cfg, len);
> >    791		if (ret != len && ret >= 0)
> >    792			return -EIO;
> >    793	
> >  > 794		return scnprintf(buf, PAGE_SIZE, "%hi\n", le16_to_cpu(*field));
> >    795	}
> >    796	
> > 
> > ---
> > 0-DAY CI Kernel Test Service, Intel Corporation
> > https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org
> 
> The fix was discussed and submitted on May 10 in this commit
> https://patchwork.kernel.org/project/linux-input/patch/20210510163428.2415-1-michael.zaidman@gmail.com/
> But I see that it was not taken into v5.13.
> Jiri, could you please comment?

This one fell in between cracks of my inbox, sorry. Now queued in 
for-5.14/upstream-fixes.

-- 
Jiri Kosina
SUSE Labs

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ