lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <202503191502.hwDCBZeN-lkp@intel.com>
Date: Wed, 19 Mar 2025 15:30:00 +0800
From: kernel test robot <lkp@...el.com>
To: marius.cristea@...rochip.com, jic23@...nel.org, lars@...afoo.de,
	robh@...nel.org
Cc: oe-kbuild-all@...ts.linux.dev, krzk+dt@...nel.org, conor+dt@...nel.org,
	oskar.andero@...il.com, linux-iio@...r.kernel.org,
	devicetree@...r.kernel.org, linux-kernel@...r.kernel.org,
	marius.cristea@...rochip.com
Subject: Re: [PATCH v2 2/2] iio: adc: adding support for PAC194X

Hi,

kernel test robot noticed the following build warnings:

[auto build test WARNING on 577a66e2e634f712384c57a98f504c44ea4b47da]

url:    https://github.com/intel-lab-lkp/linux/commits/marius-cristea-microchip-com/dt-bindings-iio-adc-adding-support-for-PAC194X/20250317-171150
base:   577a66e2e634f712384c57a98f504c44ea4b47da
patch link:    https://lore.kernel.org/r/20250317090803.30003-3-marius.cristea%40microchip.com
patch subject: [PATCH v2 2/2] iio: adc: adding support for PAC194X
config: microblaze-randconfig-r131-20250319 (https://download.01.org/0day-ci/archive/20250319/202503191502.hwDCBZeN-lkp@intel.com/config)
compiler: microblaze-linux-gcc (GCC) 7.5.0
reproduce: (https://download.01.org/0day-ci/archive/20250319/202503191502.hwDCBZeN-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202503191502.hwDCBZeN-lkp@intel.com/

sparse warnings: (new ones prefixed by >>)
>> drivers/iio/adc/pac1944.c:813:55: sparse: sparse: incorrect type in argument 3 (different base types) @@     expected unsigned short [usertype] value @@     got restricted __be16 [assigned] [usertype] tmp_be16 @@
   drivers/iio/adc/pac1944.c:813:55: sparse:     expected unsigned short [usertype] value
   drivers/iio/adc/pac1944.c:813:55: sparse:     got restricted __be16 [assigned] [usertype] tmp_be16
>> drivers/iio/adc/pac1944.c:2148:80: sparse: sparse: incorrect type in argument 3 (different base types) @@     expected unsigned short [usertype] value @@     got restricted __be16 [addressable] [assigned] [usertype] tmp_be16 @@
   drivers/iio/adc/pac1944.c:2148:80: sparse:     expected unsigned short [usertype] value
   drivers/iio/adc/pac1944.c:2148:80: sparse:     got restricted __be16 [addressable] [assigned] [usertype] tmp_be16
>> drivers/iio/adc/pac1944.c:2936:79: sparse: sparse: incorrect type in argument 3 (different base types) @@     expected unsigned short [usertype] value @@     got restricted __be16 [usertype] @@
   drivers/iio/adc/pac1944.c:2936:79: sparse:     expected unsigned short [usertype] value
   drivers/iio/adc/pac1944.c:2936:79: sparse:     got restricted __be16 [usertype]
   drivers/iio/adc/pac1944.c:2953:72: sparse: sparse: incorrect type in argument 3 (different base types) @@     expected unsigned short [usertype] value @@     got restricted __be16 [usertype] @@
   drivers/iio/adc/pac1944.c:2953:72: sparse:     expected unsigned short [usertype] value
   drivers/iio/adc/pac1944.c:2953:72: sparse:     got restricted __be16 [usertype]

vim +813 drivers/iio/adc/pac1944.c

   794	
   795	static int pac1944_update_alert_16b(struct device *dev, u8 addr,
   796					    u32 mask, u16 value)
   797	{
   798		struct iio_dev *indio_dev = dev_to_iio_dev(dev);
   799		struct pac1944_chip_info *info = iio_priv(indio_dev);
   800		struct i2c_client *client = info->client;
   801		int ret;
   802		__be16 tmp_be16;
   803		u8 status[PAC1944_ALERT_ENABLE_REG_LEN];
   804	
   805		ret = pac1944_disable_alert_reg(dev, mask, &status[0]);
   806		if (ret) {
   807			dev_err(dev, "failing to write %s\n", __func__);
   808			return ret;
   809		}
   810	
   811		tmp_be16 = cpu_to_be16(value);
   812	
 > 813		ret = i2c_smbus_write_word_data(client, addr, tmp_be16);
   814		if (ret) {
   815			dev_err(dev, "failing to write %s\n", __func__);
   816			return ret;
   817		}
   818	
   819		return pac1944_restore_alert_reg(indio_dev, &status[0]);
   820	}
   821	

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ