lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <201712160242.DgoPHAeQ%fengguang.wu@intel.com>
Date:   Sat, 16 Dec 2017 02:50:06 +0800
From:   kbuild test robot <fengguang.wu@...el.com>
To:     Salil Mehta <salil.mehta@...wei.com>
Cc:     kbuild-all@...org, netdev@...r.kernel.org,
        lipeng <lipeng321@...wei.com>
Subject: [net-next:master 355/378]
 drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_mbx.c:236:16: sparse:
 restricted __le16 degrades to integer

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git master
head:   82f67bc6beb27120e8ccd1de8bd704edf3f79813
commit: dde1a86e93cadf9b17ec0a95a78c99505c48fd83 [355/378] net: hns3: Add mailbox support to PF driver
reproduce:
        # apt-get install sparse
        git checkout dde1a86e93cadf9b17ec0a95a78c99505c48fd83
        make ARCH=x86_64 allmodconfig
        make C=1 CF=-D__CHECK_ENDIAN__


sparse warnings: (new ones prefixed by >>)


vim +236 drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_mbx.c

   226	
   227	void hclge_mbx_handler(struct hclge_dev *hdev)
   228	{
   229		struct hclge_cmq_ring *crq = &hdev->hw.cmq.crq;
   230		struct hclge_mbx_vf_to_pf_cmd *req;
   231		struct hclge_vport *vport;
   232		struct hclge_desc *desc;
   233		int ret;
   234	
   235		/* handle all the mailbox requests in the queue */
 > 236		while (hnae_get_bit(crq->desc[crq->next_to_use].flag,

---
0-DAY kernel test infrastructure                Open Source Technology Center
https://lists.01.org/pipermail/kbuild-all                   Intel Corporation

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ