lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 13 Jun 2013 18:16:19 +0300
From:	Tommi Rantala <tt.rantala@...il.com>
To:	"David S. Miller" <davem@...emloft.net>, netdev@...r.kernel.org
Cc:	LKML <linux-kernel@...r.kernel.org>
Subject: include/net/ipv6.h:408:38: warning: ‘*((void *)&addr+8)’ may be used uninitialized in this function

Hello, I'm seeing the following compiler warnings. Do these make any
sense? I'm doing a x86-64 build.

/build/linux/net/ipv4/tcp_metrics.c: In function ‘tcp_peer_is_proven’:
/build/linux/include/net/ipv6.h:408:38: warning: ‘*((void *)&addr+8)’
may be used uninitialized in this function [-Wmaybe-uninitialized]
/build/linux/net/ipv4/tcp_metrics.c:211:23: note: ‘*((void *)&addr+8)’
was declared here
In file included from /build/linux/include/net/inetpeer.h:15:0,
                 from /build/linux/net/ipv4/tcp_metrics.c:16:
/build/linux/net/ipv4/tcp_metrics.c: In function ‘tcp_tw_remember_stamp’:
/build/linux/include/net/ipv6.h:408:38: warning: ‘*((void *)&addr+8)’
may be used uninitialized in this function [-Wmaybe-uninitialized]
/build/linux/net/ipv4/tcp_metrics.c:245:23: note: ‘*((void *)&addr+8)’
was declared here

$ gcc --version
gcc (Ubuntu/Linaro 4.7.3-1ubuntu1) 4.7.3
Copyright (C) 2012 Free Software Foundation, Inc.
This is free software; see the source for copying conditions.  There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

config:
http://fpaste.org/18443/13711363/

Tommi
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ