lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CACGkMEtBQr9ZSdN0WUxEZ7wHb5ikpyheVAjfbiPSDRM8SqHhcQ@mail.gmail.com> Date: Tue, 27 Sep 2022 12:38:47 +0800 From: Jason Wang <jasowang@...hat.com> To: Zhu Lingshan <lingshan.zhu@...el.com> Cc: mst@...hat.com, virtualization@...ts.linux-foundation.org, netdev@...r.kernel.org, kvm@...r.kernel.org Subject: Re: [PATCH V2 RESEND 5/6] vDPA: fix spars cast warning in vdpa_dev_net_mq_config_fill On Tue, Sep 27, 2022 at 11:10 AM Zhu Lingshan <lingshan.zhu@...el.com> wrote: > > This commit fixes spars warnings: cast to restricted __le16 > in function vdpa_dev_net_mq_config_fill() > > Signed-off-by: Zhu Lingshan <lingshan.zhu@...el.com> Acked-by: Jason Wang <jasowang@...hat.com> > --- > drivers/vdpa/vdpa.c | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/drivers/vdpa/vdpa.c b/drivers/vdpa/vdpa.c > index 84a0c3877d7c..fa7f65279f79 100644 > --- a/drivers/vdpa/vdpa.c > +++ b/drivers/vdpa/vdpa.c > @@ -809,7 +809,8 @@ static int vdpa_dev_net_mq_config_fill(struct sk_buff *msg, u64 features, > (features & BIT_ULL(VIRTIO_NET_F_RSS)) == 0) > return 0; > > - val_u16 = le16_to_cpu(config->max_virtqueue_pairs); > + val_u16 = __virtio16_to_cpu(true, config->max_virtqueue_pairs); > + > return nla_put_u16(msg, VDPA_ATTR_DEV_NET_CFG_MAX_VQP, val_u16); > } > > -- > 2.31.1 >
Powered by blists - more mailing lists