Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp4706326imm; Wed, 30 May 2018 10:20:18 -0700 (PDT) X-Google-Smtp-Source: ADUXVKK6z/GxSaJDJJuQSzbb3KEHgk95wfRYY8MAwdFlb/C7XAMKfW/HPc0VpeMFZ34Dhz2gNFf4 X-Received: by 2002:a63:81c7:: with SMTP id t190-v6mr2849753pgd.378.1527700818211; Wed, 30 May 2018 10:20:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527700818; cv=none; d=google.com; s=arc-20160816; b=GKip9k9CP+o0UChnnER1xAGJmD8v/JnrWHp93HqsmuT9XDCER1abEmlbkohwnmFhex xL+W6hBfm0xFiY0C02KSfd5F/WxcJMML1bZs1neu5e9zTJniUZBpahhq5XpuLzK+Ilge RXn/0lzwrB3CLpIArEznczIVlpHw8ak3Ff37ZnmgrZJAgv6764jX/QqsLI5yp8wx1e3d d7g0t/sh43D0tSi4UMkeCejZ/S2671nUuvkbkwjQvMB2A46oR7zogRc1q4w9P9LPokxt RbUwzdLx0Mzaq74raED8oIJrjKDqK8m+S7Gq2/ox7WXog45yqgzk573scENulV9aj681 8vWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date :arc-authentication-results; bh=O+RNNTz8VqrGO5tZR/6OY/0gTHywuhn02LSipnm5mio=; b=RDDDC4zB65iOw7xth7ANAgzXBtMbXOeddfjiGtj6DAmlt1S94KFY11lRvsEIwgMYGi RSDDZffCmOczMkld4s5HVL3iacTTGN5PEJO9cV+Psb9SLJegVBkPfhvZYPRpeDjByXCc sJJiC36tgqu6FXHMwMNsR9jSmzgTIQ8KqWToAxjBdcw95ZlbsSm/n5R7SLWEAfOS2MpX jblwXVbbqyUTfMpkJvg/37szuwSeVVsi1e+9rMaFN7YQPhSjrT6K49hSvPLDT8v+gGcJ oT9jvWv1TG/E0HQIrFL2NqDv+WPGwhprL0V2GJIC5rfb2rK15qJ3pSlUFHUJQDYFPgrB Q6DA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s67-v6si1733987pfd.288.2018.05.30.10.20.03; Wed, 30 May 2018 10:20:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753907AbeE3RTG (ORCPT + 99 others); Wed, 30 May 2018 13:19:06 -0400 Received: from shards.monkeyblade.net ([184.105.139.130]:44802 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753828AbeE3RTD (ORCPT ); Wed, 30 May 2018 13:19:03 -0400 Received: from localhost (ec2-52-45-90-242.compute-1.amazonaws.com [52.45.90.242]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 71A5F14721676; Wed, 30 May 2018 10:19:02 -0700 (PDT) Date: Wed, 30 May 2018 13:18:59 -0400 (EDT) Message-Id: <20180530.131859.1905291199897432856.davem@davemloft.net> To: arnd@arndb.de Cc: fugang.duan@nxp.com, fabio.estevam@nxp.com, andrew@lunn.ch, troy.kisky@boundarydevices.com, f.fainelli@gmail.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH, net-next] net: ethernet: freescale: fix false-positive string overflow warning From: David Miller In-Reply-To: <20180528154958.2684086-1-arnd@arndb.de> References: <20180528154958.2684086-1-arnd@arndb.de> X-Mailer: Mew version 6.7 on Emacs 25.3 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Wed, 30 May 2018 10:19:03 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Arnd Bergmann Date: Mon, 28 May 2018 17:49:46 +0200 > While compile-testing on arm64 with gcc-8.1, I ran into a build diagnostic: ... > It appears this has never shown on ppc32 or arm32 for an unknown reason, but > now gcc fails to identify that the 'irq_cnt' loop index has an upper bound > of 3, and instead uses a bogus range. > > To work around the warning, this changes the sprintf to snprintf with the > correct buffer length. > > Fixes: 78cc6e7ef957 ("net: ethernet: freescale: Allow FEC with COMPILE_TEST") > Signed-off-by: Arnd Bergmann Applied, thanks Arnd.