Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1127976ybb; Wed, 1 Apr 2020 16:28:26 -0700 (PDT) X-Google-Smtp-Source: APiQypKFIXBuISQ+Dy66pnC+YHX7FJXpppci+QpPdCTLSR9wbK0NyffWplMju9IQ2dwAoHrqTIGH X-Received: by 2002:a4a:a64b:: with SMTP id j11mr555685oom.59.1585783706408; Wed, 01 Apr 2020 16:28:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585783706; cv=none; d=google.com; s=arc-20160816; b=PmWEoKlGnQI+niu0QBLRzdK2d567pnjMAW4fojy1K9s1uViSLDlyUXpFdpogk/8bIP 3sNycd5DFtgsjeUj1ChZv20GucNiuuimkFZwfHNK5Chf3MHF37mW4vVY2fv/DOTdFg/7 YBk9l6zITBg/bQdjrkhHyLWQj1prqdI2wembvoWENC8Xjjia5P3CPincNxJpkMceTIKS NwaVDjvVjXeq9V/6htQQudgsKdg7hRVcD860fx/Uv8/QxrpOsc9OtQcgKt2sg2fQPIXz lAxZVN/6fhuT5MtzzrrEe3kuH6Ax6XSLtpkjzEwR5pv8gLmvg1+7iMLjQENN+uBGzQlx 3RVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=0sJV49DhTo0UVSrbO4WCeUFffx6SJbb/b0qI27J8Hfk=; b=iLRIAlJT1ZxN7O5sJWxjmFeFU+nqHKjcCT4sw5A0ZY0Q0hYb1xmz6R2JO6xwyT4kRY hVNXtt3xwHEPay3u/V3ZtCyCDorhw8KCFXsqWXmH8WC7VtL2Ebp4SKa7k7JzIMbuZ4/z YBhfJLZvUAERYSVgBzQATg88XsCuTc0TMsvIeM0HPyVBQQo8RzulPo4JTOmFLQlFGpQP 2g0OND2Gw4EllrQ6McrZxgWs9rgbSJk6PyJZ5r01CFJTiT8CHuYxljMOYZBB4Qusjshk 6an6aL4z6w0bStzHvXuzekV1jiPx7Px+/2loqJXGgBjesWh5JePJWW7k+cLR62fsmhV9 31WA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s139si1503717oih.7.2020.04.01.16.28.11; Wed, 01 Apr 2020 16:28:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733283AbgDAX1k (ORCPT + 99 others); Wed, 1 Apr 2020 19:27:40 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:48608 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732503AbgDAX1k (ORCPT ); Wed, 1 Apr 2020 19:27:40 -0400 Received: from 1.general.cking.uk.vpn ([10.172.193.212] helo=localhost) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1jJmlk-0007s0-IS; Wed, 01 Apr 2020 23:27:36 +0000 From: Colin King To: Igor Russkikh , "David S . Miller" , Mark Starovoytov , Dmitry Bogdanov , netdev@vger.kernel.org Cc: kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH][next] net: atlantic: fix missing | operator when assigning rec->llc Date: Thu, 2 Apr 2020 00:27:36 +0100 Message-Id: <20200401232736.410028-1-colin.king@canonical.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Colin Ian King rec->llc is currently being assigned twice, once with the lower 8 bits from packed_record[8] and then re-assigned afterwards with data from packed_record[9]. This looks like a type, I believe the second assignment should be using the |= operator rather than a direct assignment. Addresses-Coverity: ("Unused value") Fixes: b8f8a0b7b5cb ("net: atlantic: MACSec ingress offload HW bindings") Signed-off-by: Colin Ian King --- drivers/net/ethernet/aquantia/atlantic/macsec/macsec_api.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/aquantia/atlantic/macsec/macsec_api.c b/drivers/net/ethernet/aquantia/atlantic/macsec/macsec_api.c index 97901c114bfa..fbe9d88b13c7 100644 --- a/drivers/net/ethernet/aquantia/atlantic/macsec/macsec_api.c +++ b/drivers/net/ethernet/aquantia/atlantic/macsec/macsec_api.c @@ -491,7 +491,7 @@ get_ingress_preclass_record(struct aq_hw_s *hw, rec->snap[1] = packed_record[8] & 0xFF; rec->llc = (packed_record[8] >> 8) & 0xFF; - rec->llc = packed_record[9] << 8; + rec->llc |= packed_record[9] << 8; rec->mac_sa[0] = packed_record[10]; rec->mac_sa[0] |= packed_record[11] << 16; -- 2.25.1