Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp3517083pxj; Sun, 20 Jun 2021 23:53:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxTNGE8nsNSi0dx1iY3xi0tNCsQbQ9j/WTbJrcFsgh6DR3OxErj8aH4o4DT1WsqmeyDZBVJ X-Received: by 2002:a17:907:3e0b:: with SMTP id hp11mr2708396ejc.89.1624258420806; Sun, 20 Jun 2021 23:53:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624258420; cv=none; d=google.com; s=arc-20160816; b=yxtBIlJcZnAIlSbvEpML/K9BzoIPsfXw625GzBPjD3PP0SANM8JbHgOPvz2cXY5f8L sfLnRzSmnYGJeae/++3Pp/MAnyZH70Hpo0XPwrr0dt8eAjafuetnrScmk1QUwe8PsVDr WlzlQymgDgYTB7+SbQ3KiF1vJDy8kLd3LtQXmhxbzlbHUpcbAc0iC0iWDqZgLxq2eK+k sAMK79hY+JdOZ2PBlrCHWaPYCkEoscfdkc7caxk6mswyYC93POILDq7ja6/sxZAw2b/m 1pAnFHN5HGyhZEvlU4Ac/psk2wefP3ohhM1zp4BebEG5s0k+Vd6IGyuLgwnjxGz9v7y9 YSpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature :dkim-signature; bh=fVBNFAIC+o0Qr3V3e8/8B3LGO4oYUVLp/J0au7zPfBE=; b=x0KqDXX4gxyNXjYtpuDFc1rZAevfQpA6GC5kh+V++nwyNTgwwz1ne0178WYzbEYrj4 yjhebYL8NmY3JkRLBDKTnZ8Z+zXYu79wfo5CpbEzZ1q1ZUife9vwahNZvM55Aqp1ej3+ Xle9GzjbJJzCU1sIwrih7ZRkPxV/hWNR8nRU5bekH9MUxhPPrRGd5ZusH2ZReqcl3Idp zq/cKlj0WPXzCLfES4Z2Sf/wpF/RoG4Jkjk2nYHXqHcuwAd9ShJ0tX9tjYe8a+bCP0of o3LctDDftuuYhVMq6/1KD7vt+cJ3+hkaSOA8zmR8G9HorahE/RVH6vXz+exwa3IthWyK 5XRA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kroah.com header.s=fm1 header.b=ittxmqKz; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b=UFfUp98t; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u9si3837782eds.493.2021.06.20.23.53.18; Sun, 20 Jun 2021 23:53:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kroah.com header.s=fm1 header.b=ittxmqKz; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b=UFfUp98t; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229708AbhFUGym (ORCPT + 99 others); Mon, 21 Jun 2021 02:54:42 -0400 Received: from out4-smtp.messagingengine.com ([66.111.4.28]:34289 "EHLO out4-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229576AbhFUGyl (ORCPT ); Mon, 21 Jun 2021 02:54:41 -0400 Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.nyi.internal (Postfix) with ESMTP id D34615C009A; Mon, 21 Jun 2021 02:52:27 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute3.internal (MEProxy); Mon, 21 Jun 2021 02:52:27 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kroah.com; h= date:from:to:cc:subject:message-id:references:mime-version :content-type:in-reply-to; s=fm1; bh=fVBNFAIC+o0Qr3V3e8/8B3LGO4o YUVLp/J0au7zPfBE=; b=ittxmqKzyd8JOXXwLwhsQNyioIk3W5OYIYElIsRQDM8 j1AsckJs6sMPdFKBOrTC/lGqRYy2P7Y+b89FCnrYt94+L6+6oEFBi6VKsIuZqJRm Jd8lzf/VybhlJ+VXgXw5S785XPxl9diUvCNPpnaCulfXFE0JVeDxu58I9tCYRsg/ 5jScc79UU7sWlEgHXbzxxsl3Nq9QHbK+qGS3O5EegsnBVkUiia8M4iAyiAOmHgz7 r559G3hhjtcqh3/LdW7X/1ubGM7l67BivHZLyD3Soxnvv7C2C+0YyOM0L/8JHut6 5yijizcbMs3fOvkMDr+s/ZeU/9YrTkKNQ7mUbKkaiFw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=fVBNFA IC+o0Qr3V3e8/8B3LGO4oYUVLp/J0au7zPfBE=; b=UFfUp98ti3YvtEm9W/KNaZ KLgcY0YN/a3aNF2W30+7L+XTaO3HkUYI+7/8CMOP2G/b54haBhSkin3WCUdKAuFx uiNQycpaUkICMJ3uUTCf/ktPP6xGIFtJh0AVU8WKwwLiaR5FOotmEc9NryqURrYs MMTaZn6f2t+xXQqPhkDxCLkBgr1PiVoXuTBdsgTSIAnB22x4YOv6U3MCL8L3SKIH S1I2z9U0CFPQeCtZtkLOxiI7OiqFnXZPsCPdWr51TtRjCv4bdwKJGJv2IVEf3hb9 nraLlT9FXSPNB+PlKaHhR1KF2qv5cDK0/VD7N5mX+thrvKMHEYF+ndtbr9fnEA5Q == X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduledrfeefkedguddtkecutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecunecujfgurhepfffhvffukfhfgggtuggjsehttd ertddttddvnecuhfhrohhmpefirhgvghcumffjuceoghhrvghgsehkrhhorghhrdgtohhm qeenucggtffrrghtthgvrhhnpeettdeffeegffeuveeffefftedvuefhiedvvdehjedvfe etvddvteethfeiiefgudenucffohhmrghinhepghhithhhuhgsrdgtohhmpdhgihhthhhu sghushgvrhgtohhnthgvnhhtrdgtohhmpddtuddrohhrghenucevlhhushhtvghrufhiii gvpedtnecurfgrrhgrmhepmhgrihhlfhhrohhmpehgrhgvgheskhhrohgrhhdrtghomh X-ME-Proxy: Received: by mail.messagingengine.com (Postfix) with ESMTPA; Mon, 21 Jun 2021 02:52:27 -0400 (EDT) Date: Mon, 21 Jun 2021 08:52:24 +0200 From: Greg KH To: Jhih-Ming Huang Cc: linux-staging@lists.linux.dev, linux-kernel@vger.kernel.org Subject: Re: [fbihjmeric@gmail.com: Re: drivers/staging/rtl8723bs/core/rtw_security.c:95:9: warning: variable 'crc' set but not used] Message-ID: References: <20210621063041.v4u35pxgglgwn2go@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210621063041.v4u35pxgglgwn2go@gmail.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 21, 2021 at 02:30:41PM +0800, Jhih-Ming Huang wrote: > On Sat, Jun 19, 2021 at 6:27 PM kernel test robot wrote: > > > > tree: https://github.com/0day-ci/linux/commits/UPDATE-20210619-155350/Jhih-Ming-Huang/rtw_security-fix-cast-to-restricted-__le32/20210616-131056 > > head: ed0359e3fa64928e48021387a694f211bc840ff7 > > commit: ed0359e3fa64928e48021387a694f211bc840ff7 rtw_security: fix cast to restricted __le32 > > date: 3 hours ago > > config: sh-allmodconfig (attached as .config) > > compiler: sh4-linux-gcc (GCC) 9.3.0 > > reproduce (this is a W=1 build): > > wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross > > chmod +x ~/bin/make.cross > > # https://github.com/0day-ci/linux/commit/ed0359e3fa64928e48021387a694f211bc840ff7 > > git remote add linux-review https://github.com/0day-ci/linux > > git fetch --no-tags linux-review UPDATE-20210619-155350/Jhih-Ming-Huang/rtw_security-fix-cast-to-restricted-__le32/20210616-131056 > > git checkout ed0359e3fa64928e48021387a694f211bc840ff7 > > # save the attached .config to linux build tree > > COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-9.3.0 make.cross ARCH=sh > > > > If you fix the issue, kindly add following tag as appropriate > > Reported-by: kernel test robot > > > > All warnings (new ones prefixed by >>): > > > > drivers/staging/rtl8723bs/core/rtw_security.c: In function 'rtw_wep_decrypt': > > >> drivers/staging/rtl8723bs/core/rtw_security.c:95:9: warning: variable 'crc' set but not used [-Wunused-but-set-variable] > > 95 | __le32 crc; > > | ^~~ > > > > Kconfig warnings: (for reference only) > > WARNING: unmet direct dependencies detected for SND_ATMEL_SOC_PDC > > Depends on SOUND && !UML && SND && SND_SOC && SND_ATMEL_SOC && HAS_DMA > > Selected by > > - SND_ATMEL_SOC_SSC && SOUND && !UML && SND && SND_SOC && SND_ATMEL_SOC > > - SND_ATMEL_SOC_SSC_PDC && SOUND && !UML && SND && SND_SOC && SND_ATMEL_SOC && ATMEL_SSC > > > > > > vim +/crc +95 drivers/staging/rtl8723bs/core/rtw_security.c > > > > 91 > > 92 void rtw_wep_decrypt(struct adapter *padapter, u8 *precvframe) > > 93 { > > 94 /* exclude ICV */ > > > 95 __le32 crc; > > 96 signed int length; > > 97 u32 keylength; > > 98 u8 *pframe, *payload, *iv, wepkey[16]; > > 99 u8 keyindex; > > 100 struct rx_pkt_attrib *prxattrib = &(((union recv_frame *)precvframe)->u.hdr.attrib); > > 101 struct security_priv *psecuritypriv = &padapter->securitypriv; > > 102 struct arc4_ctx *ctx = &psecuritypriv->recv_arc4_ctx; > > 103 > > 104 pframe = (unsigned char *)((union recv_frame *)precvframe)->u.hdr.rx_data; > > 105 > > 106 /* start to decrypt recvframe */ > > 107 if ((prxattrib->encrypt == _WEP40_) || (prxattrib->encrypt == _WEP104_)) { > > 108 iv = pframe+prxattrib->hdrlen; > > 109 /* keyindex =(iv[3]&0x3); */ > > 110 keyindex = prxattrib->key_index; > > 111 keylength = psecuritypriv->dot11DefKeylen[keyindex]; > > 112 memcpy(&wepkey[0], iv, 3); > > 113 /* memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[psecuritypriv->dot11PrivacyKeyIndex].skey[0], keylength); */ > > 114 memcpy(&wepkey[3], &psecuritypriv->dot11DefKey[keyindex].skey[0], keylength); > > 115 length = ((union recv_frame *)precvframe)->u.hdr.len-prxattrib->hdrlen-prxattrib->iv_len; > > 116 > > 117 payload = pframe+prxattrib->iv_len+prxattrib->hdrlen; > > 118 > > 119 /* decrypt payload include icv */ > > 120 arc4_setkey(ctx, wepkey, 3 + keylength); > > 121 arc4_crypt(ctx, payload, payload, length); > > 122 > > 123 /* calculate icv and compare the icv */ > > 124 crc = cpu_to_le32(~crc32_le(~0, payload, length - 4)); > > 125 > > 126 } > > 127 } > > 128 > > > > --- > > 0-DAY CI Kernel Test Service, Intel Corporation > > https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org > > This warning was introduced by my pull request, > but I am fixing the sparse warning and the unused variable was > declared in the previous commit. > The original author did not compare the crc and payload in > rtw_wep_decrypt, so the variable 'crc' was set but not used. > > Should I fix this in my pull request? We do not do "pull requests" in the kernel development process for normal changes. Just send a patch like normal for this and I will be glad to apply it to my trees and send it onward. thanks, greg k-h