lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20230520073428.3781-1-minhuadotchen@gmail.com> Date: Sat, 20 May 2023 15:34:28 +0800 From: Min-Hua Chen <minhuadotchen@...il.com> To: kuba@...nel.org Cc: alexandre.torgue@...s.st.com, davem@...emloft.net, edumazet@...gle.com, joabreu@...opsys.com, linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org, linux-stm32@...md-mailman.stormreply.com, mcoquelin.stm32@...il.com, minhuadotchen@...il.com, netdev@...r.kernel.org, pabeni@...hat.com, peppe.cavallaro@...com, simon.horman@...igine.com Subject: Re: [PATCH v3] net: stmmac: compare p->des0 and p->des1 with __le32 type values Hi Jakub, >We can make working with sparse easier by making sure it doesn't >generate false positive warnings :\ It will be good if sparse can handle this case correctly. > >> (There are around 7000 sparse warning in ARCH=arm64 defconfig build and >> sometimes it is hard to remember all the false alarm cases) >> >> Could you consider taking this patch, please? > >No. We don't take patches to address false positive static >checker warnings. No problem. thanks, Min-Hua
Powered by blists - more mailing lists