lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <202310240609.nPpYbL1B-lkp@intel.com> Date: Tue, 24 Oct 2023 07:09:35 +0800 From: kernel test robot <lkp@...el.com> To: Parthiban Veerasooran <Parthiban.Veerasooran@...rochip.com>, davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com, robh+dt@...nel.org, krzysztof.kozlowski+dt@...aro.org, conor+dt@...nel.org, corbet@....net, steen.hegelund@...rochip.com, rdunlap@...radead.org, horms@...nel.org, casper.casan@...il.com, andrew@...n.ch Cc: oe-kbuild-all@...ts.linux.dev, netdev@...r.kernel.org, devicetree@...r.kernel.org, linux-kernel@...r.kernel.org, linux-doc@...r.kernel.org, horatiu.vultur@...rochip.com, Woojung.Huh@...rochip.com, Nicolas.Ferre@...rochip.com, UNGLinuxDriver@...rochip.com, Thorsten.Kummermehr@...rochip.com, Parthiban Veerasooran <Parthiban.Veerasooran@...rochip.com> Subject: Re: [PATCH net-next v2 1/9] net: ethernet: implement OPEN Alliance control transaction interface Hi Parthiban, kernel test robot noticed the following build warnings: [auto build test WARNING on net-next/main] url: https://github.com/intel-lab-lkp/linux/commits/Parthiban-Veerasooran/net-ethernet-implement-OPEN-Alliance-control-transaction-interface/20231023-235310 base: net-next/main patch link: https://lore.kernel.org/r/20231023154649.45931-2-Parthiban.Veerasooran%40microchip.com patch subject: [PATCH net-next v2 1/9] net: ethernet: implement OPEN Alliance control transaction interface config: sparc-allyesconfig (https://download.01.org/0day-ci/archive/20231024/202310240609.nPpYbL1B-lkp@intel.com/config) compiler: sparc64-linux-gcc (GCC) 13.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231024/202310240609.nPpYbL1B-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp@...el.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202310240609.nPpYbL1B-lkp@intel.com/ All warnings (new ones prefixed by >>): >> drivers/net/ethernet/oa_tc6.c:250: warning: Function parameter or member 'len' not described in 'oa_tc6_read_registers' vim +250 drivers/net/ethernet/oa_tc6.c 238 239 /** 240 * oa_tc6_read_registers - function for reading multiple consecutive registers. 241 * @tc6: oa_tc6 struct. 242 * @addr: address of the first register to be read in the MACPHY. 243 * @val: values to be read from the starting register address @addr. 244 * 245 * Maximum of 128 consecutive registers can be read starting at @addr. 246 * 247 * Returns 0 on success otherwise failed. 248 */ 249 int oa_tc6_read_registers(struct oa_tc6 *tc6, u32 addr, u32 val[], u8 len) > 250 { 251 return oa_tc6_perform_ctrl(tc6, addr, val, len, false, tc6->prote); 252 } 253 EXPORT_SYMBOL_GPL(oa_tc6_read_registers); 254 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki
Powered by blists - more mailing lists