lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <201606041010.Uqa8jrpA%fengguang.wu@intel.com>
Date:	Sat, 4 Jun 2016 10:32:11 +0800
From:	kbuild test robot <fengguang.wu@...el.com>
To:	unlisted-recipients:; (no To-header on input)
Cc:	kbuild-all@...org, netdev@...r.kernel.org,
	Marcelo Ricardo Leitner <marcelo.leitner@...il.com>
Subject: [net-next:master 20/29] net/sctp/output.c:185:21: warning: format
 '%lu' expects argument of type 'long unsigned int', but argument 4 has type
 'size_t {aka unsigned int}'

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git master
head:   03c7f70beee4c5d34881e5d3dd2b6f3e848047ef
commit: 942b3235bf77e5600a05d6e85f0415bdeb8068bb [20/29] sctp: improve debug message to also log curr pkt and new chunk size
config: i386-allyesconfig (attached as .config)
compiler: gcc-6 (Debian 6.1.1-1) 6.1.1 20160430
reproduce:
        git checkout 942b3235bf77e5600a05d6e85f0415bdeb8068bb
        # save the attached .config to linux build tree
        make ARCH=i386 

All warnings (new ones prefixed by >>):

   net/sctp/output.c: In function 'sctp_packet_transmit_chunk':
>> net/sctp/output.c:185:21: warning: format '%lu' expects argument of type 'long unsigned int', but argument 4 has type 'size_t {aka unsigned int}' [-Wformat=]
     pr_debug("%s: packet:%p size:%lu chunk:%p size:%d\n", __func__,
                        ^~~~~~

vim +185 net/sctp/output.c

   169	}
   170	
   171	/* This routine tries to append the chunk to the offered packet. If adding
   172	 * the chunk causes the packet to exceed the path MTU and COOKIE_ECHO chunk
   173	 * is not present in the packet, it transmits the input packet.
   174	 * Data can be bundled with a packet containing a COOKIE_ECHO chunk as long
   175	 * as it can fit in the packet, but any more data that does not fit in this
   176	 * packet can be sent only after receiving the COOKIE_ACK.
   177	 */
   178	sctp_xmit_t sctp_packet_transmit_chunk(struct sctp_packet *packet,
   179					       struct sctp_chunk *chunk,
   180					       int one_packet, gfp_t gfp)
   181	{
   182		sctp_xmit_t retval;
   183		int error = 0;
   184	
 > 185		pr_debug("%s: packet:%p size:%lu chunk:%p size:%d\n", __func__,
   186			 packet, packet->size, chunk, chunk->skb ? chunk->skb->len : -1);
   187	
   188		switch ((retval = (sctp_packet_append_chunk(packet, chunk)))) {
   189		case SCTP_XMIT_PMTU_FULL:
   190			if (!packet->has_cookie_echo) {
   191				error = sctp_packet_transmit(packet, gfp);
   192				if (error < 0)
   193					chunk->skb->sk->sk_err = -error;

---
0-DAY kernel test infrastructure                Open Source Technology Center
https://lists.01.org/pipermail/kbuild-all                   Intel Corporation

Download attachment ".config.gz" of type "application/octet-stream" (54406 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ