This is a patch to the hal/rtl8723au_xmit.c file that fixes various
warnings:
"invalid warning: invalid assignment: |=
left side has type unsigned int
right side has type restricted __le32"
found by sparse tool.
Signed-off-by: Yannis Damigos
---
drivers/staging/rtl8723au/hal/rtl8723au_xmit.c
> -Original Message-
> From: Michal Hocko [mailto:mho...@suse.cz]
> Sent: Thursday, December 11, 2014 4:58 AM
> To: KY Srinivasan
> Cc: Yasuaki Ishimatsu; gre...@linuxfoundation.org; linux-
> ker...@vger.kernel.org; de...@linuxdriverproject.org; o...@aepfle.de;
> a...@canonical.com; linux
There is otherwise a risk of a possible null pointer dereference.
Was largely found by using a static code analysis program called cppcheck.
Signed-off-by: Rickard Strandqvist
---
.../lustre/lustre/obdclass/lprocfs_status.c| 20 +---
1 file changed, 9 insertions(+), 11
There is otherwise a risk of a possible null pointer dereference.
Was largely found by using a static code analysis program called cppcheck.
Signed-off-by: Rickard Strandqvist
---
drivers/staging/lustre/lustre/osc/lproc_osc.c |4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --g
There is otherwise a risk of a possible null pointer dereference.
Was largely found by using a static code analysis program called cppcheck.
Signed-off-by: Rickard Strandqvist
---
drivers/staging/rtl8723au/os_dep/usb_intf.c |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git
There is otherwise a risk of a possible null pointer dereference.
Was largely found by using a static code analysis program called cppcheck.
Signed-off-by: Rickard Strandqvist
---
drivers/staging/unisys/virtpci/virtpci.c | 23 +--
1 file changed, 9 insertions(+), 14 deleti
There is otherwise a risk of a possible null pointer dereference.
Was largely found by using a static code analysis program called cppcheck.
Signed-off-by: Rickard Strandqvist
---
drivers/staging/vt6655/wmgr.c |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/stagin
On Sun, Dec 14, 2014 at 11:36:22PM +0100, Rickard Strandqvist wrote:
> There is otherwise a risk of a possible null pointer dereference.
>
> Was largely found by using a static code analysis program called cppcheck.
>
> Signed-off-by: Rickard Strandqvist
> ---
> .../lustre/lustre/obdclass/lproc
On Sun, Dec 14, 2014 at 11:41:11PM +0100, Rickard Strandqvist wrote:
> There is otherwise a risk of a possible null pointer dereference.
>
> Was largely found by using a static code analysis program called cppcheck.
>
> Signed-off-by: Rickard Strandqvist
> ---
> drivers/staging/unisys/virtpci/v
Sorry! extremely stupid. Sending new patch immediately.
Kind regards
Rickard Strandqvist
2014-12-14 23:39 GMT+01:00 Greg Kroah-Hartman :
> On Sun, Dec 14, 2014 at 11:36:22PM +0100, Rickard Strandqvist wrote:
>> There is otherwise a risk of a possible null pointer dereference.
>>
>> Was largely f
There is otherwise a risk of a possible null pointer dereference.
Was largely found by using a static code analysis program called cppcheck.
Signed-off-by: Rickard Strandqvist
---
.../lustre/lustre/obdclass/lprocfs_status.c| 24 +++-
1 file changed, 13 insertions(+), 1
Hi
Ok, if you want, otherwise we can put it after the NULL check?
Kind regards
Rickard Strandqvist
2014-12-14 23:52 GMT+01:00 Joe Perches :
> On Sun, 2014-12-14 at 23:42 +0100, Rickard Strandqvist wrote:
>> There is otherwise a risk of a possible null pointer dereference.
>> Was largely found b
It is impossible for dprivate to ever be NULL, no check required.
Signed-off-by: Rickard Strandqvist
---
drivers/staging/unisys/virtpci/virtpci.c | 29 +
1 file changed, 9 insertions(+), 20 deletions(-)
diff --git a/drivers/staging/unisys/virtpci/virtpci.c
b/drive
On Sun, 2014-12-14 at 23:42 +0100, Rickard Strandqvist wrote:
> There is otherwise a risk of a possible null pointer dereference.
> Was largely found by using a static code analysis program called cppcheck.
[]
> diff --git a/drivers/staging/vt6655/wmgr.c b/drivers/staging/vt6655/wmgr.c
[]
> @@ -439
On Sun, 2014-12-14 at 23:52 +0100, Rickard Strandqvist wrote:
> There is otherwise a risk of a possible null pointer dereference.
>
> Was largely found by using a static code analysis program called cppcheck.
Perhaps the tool could use a little work.
It's not possible for end to be NULL no?
unsi
Fixed a coding style issue
Signed-off-by: Eduardo Barretto
---
drivers/staging/wlan-ng/hfa384x_usb.c | 9 -
1 file changed, 4 insertions(+), 5 deletions(-)
diff --git a/drivers/staging/wlan-ng/hfa384x_usb.c
b/drivers/staging/wlan-ng/hfa384x_usb.c
index 55d2f56..d388f2c 100644
--- a/dri
On Mon, 2014-12-15 at 00:02 -0200, Eduardo Barretto wrote:
> Fixed a coding style issue
[]
> diff --git a/drivers/staging/wlan-ng/hfa384x_usb.c
> b/drivers/staging/wlan-ng/hfa384x_usb.c
[]
> @@ -4123,12 +4123,11 @@ static int hfa384x_isgood_pdrcode(u16 pdrcode)
> pr_debug("En
Replace calls for smp_processor_id() to get_cpu() to get the CPU ID of
the current CPU. In these instances, there is no correctness issue with
regards to preemption, we just need the current CPU ID.
Signed-off-by: K. Y. Srinivasan
---
drivers/hv/channel_mgmt.c |4 +++-
drivers/hv/connection.
> -Original Message-
> From: Jeremiah Mahler [mailto:jmmah...@gmail.com]
> Sent: Wednesday, December 10, 2014 6:10 PM
> To: KY Srinivasan
> Cc: gre...@linuxfoundation.org; linux-ker...@vger.kernel.org;
> de...@linuxdriverproject.org; o...@aepfle.de; a...@canonical.com;
> jasow...@redhat.c
KY Srinivasan,
On Mon, Dec 15, 2014 at 07:00:45AM +, KY Srinivasan wrote:
>
>
> > -Original Message-
> > From: Jeremiah Mahler [mailto:jmmah...@gmail.com]
> > Sent: Wednesday, December 10, 2014 6:10 PM
> > To: KY Srinivasan
> > Cc: gre...@linuxfoundation.org; linux-ker...@vger.kernel
20 matches
Mail list logo