lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20180315082045.yphfdbz57uih7zzl@dhcp-10-169-107-175.ie.oracle.com>
Date:   Thu, 15 Mar 2018 08:20:45 +0000
From:   Darren Kenny <darren.kenny@...cle.com>
To:     Sonny Rao <sonnyrao@...omium.org>
Cc:     kvm@...r.kernel.org, "Michael S . Tsirkin" <mst@...hat.com>,
        Jason Wang <jasowang@...hat.com>,
        virtualization@...ts.linux-foundation.org, netdev@...r.kernel.org,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH] vhost: fix vhost ioctl signature to build with clang

On Wed, Mar 14, 2018 at 10:05:06AM -0700, Sonny Rao wrote:
>Clang is particularly anal about signed vs unsigned comparisons and
>doesn't like the fact that some ioctl numbers set the MSB, so we get
>this error when trying to build vhost on aarch64:
>
>drivers/vhost/vhost.c:1400:7: error: overflow converting case value to
> switch condition type (3221794578 to 18446744072636378898)
> [-Werror, -Wswitch]
>        case VHOST_GET_VRING_BASE:
>
>3221794578 is 0xC008AF12 in hex
>18446744072636378898 is 0xFFFFFFFFC008AF12 in hex
>
>Fix this by using unsigned ints in the function signature for
>vhost_vring_ioctl().
>
>Signed-off-by: Sonny Rao <sonnyrao@...omium.org>

Reviewed-by: Darren Kenny <darren.kenny@...cle.com>

All the other callers of this function already appear to assume that
it is an unsigned int.

Thanks,

Darren.

>---
> drivers/vhost/vhost.c | 2 +-
> drivers/vhost/vhost.h | 4 ++--
> 2 files changed, 3 insertions(+), 3 deletions(-)
>
>diff --git a/drivers/vhost/vhost.c b/drivers/vhost/vhost.c
>index 1b3e8d2d5c8b4..5316319d84081 100644
>--- a/drivers/vhost/vhost.c
>+++ b/drivers/vhost/vhost.c
>@@ -1337,7 +1337,7 @@ static long vhost_set_memory(struct vhost_dev *d, struct vhost_memory __user *m)
> 	return -EFAULT;
> }
>
>-long vhost_vring_ioctl(struct vhost_dev *d, int ioctl, void __user *argp)
>+long vhost_vring_ioctl(struct vhost_dev *d, unsigned int ioctl, void __user *argp)
> {
> 	struct file *eventfp, *filep = NULL;
> 	bool pollstart = false, pollstop = false;
>diff --git a/drivers/vhost/vhost.h b/drivers/vhost/vhost.h
>index ac4b6056f19ae..d8ee85ae8fdcc 100644
>--- a/drivers/vhost/vhost.h
>+++ b/drivers/vhost/vhost.h
>@@ -45,7 +45,7 @@ void vhost_poll_stop(struct vhost_poll *poll);
> void vhost_poll_flush(struct vhost_poll *poll);
> void vhost_poll_queue(struct vhost_poll *poll);
> void vhost_work_flush(struct vhost_dev *dev, struct vhost_work *work);
>-long vhost_vring_ioctl(struct vhost_dev *d, int ioctl, void __user *argp);
>+long vhost_vring_ioctl(struct vhost_dev *d, unsigned int ioctl, void __user *argp);
>
> struct vhost_log {
> 	u64 addr;
>@@ -177,7 +177,7 @@ void vhost_dev_reset_owner(struct vhost_dev *, struct vhost_umem *);
> void vhost_dev_cleanup(struct vhost_dev *);
> void vhost_dev_stop(struct vhost_dev *);
> long vhost_dev_ioctl(struct vhost_dev *, unsigned int ioctl, void __user *argp);
>-long vhost_vring_ioctl(struct vhost_dev *d, int ioctl, void __user *argp);
>+long vhost_vring_ioctl(struct vhost_dev *d, unsigned int ioctl, void __user *argp);
> int vhost_vq_access_ok(struct vhost_virtqueue *vq);
> int vhost_log_access_ok(struct vhost_dev *);
>
>-- 
>2.13.5
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ