Received: by 2002:a05:7412:b130:b0:e2:908c:2ebd with SMTP id az48csp2107121rdb; Mon, 20 Nov 2023 02:03:00 -0800 (PST) X-Google-Smtp-Source: AGHT+IHa2AHK2ZKl9OCshpfgxwkFXuxVutX/WZn99Ve0J9dhLEr2npzRNL/j8knR3ePhRsxSLP2Q X-Received: by 2002:a17:902:7d84:b0:1ce:33b2:a1e0 with SMTP id a4-20020a1709027d8400b001ce33b2a1e0mr7721661plm.33.1700474580185; Mon, 20 Nov 2023 02:03:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700474580; cv=none; d=google.com; s=arc-20160816; b=wdBmo73ljOE/A8TCMhdf6Ih9T26YrfoPtLzWdBXGoI2OnXgjuCHEnpPCLxShlbVUXR FwFXxigUdI4gZKXz4S2MGmGqzIXASbRymYbgUXoZYf2L0RFUbbwgieM+nMjpYR1Dy0OQ KkcnSJ2hwisVqEQZKXxWs1c6LIrEOvH1yMlUja9q+zGrBtVuNthijGVTsjtxmaPYo/cI Tf14gYeCrU9byeV8KInqwzcQgZ3v3+YInZT3DLxLeePVhegAuHm1eHUF7Ibz4vFB3pNa WFQO0wkeSGGIRefURngY6dC7NkD6EJzpsbNpJnQ1I0ZPql7oqtjIxb6v/N+svcPwagNP RWoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=zyojUJiW4bdPcLYoF/zT2al+2Sk0c95v1P99A3UDEdA=; fh=q6vM6ycLRhlSltZAdI1euLzN7sstg5bIK02VSpg29g0=; b=PBvMplHr8xeoIQIy0NMuwLDPaPgFJQQhC1YTsP1RepUK5/0esq4g6pGHM0yjmNfD9s Yp66Ue1J24p6r/bL6IBKn18PjgoYil1apeP4dCIb5FKvbtJ2wMx1iu5jNrbwHn1nr4uq zsS+ya85ibpJdfk0hMOBKNTvUdbJWvbsm7eE75J06z4MWPDnESSr0mUeKjpGd74a0MQL WudoHpHJY2+JuXvtjIet5Fv09rZUVuibbLt7Zq1sacthcvwXBAb2mLeYNLNUcxk24Vx7 H4p3LWhR3bZVUZIf68zFP7XdWqq9swxfMjE+YKSWwgaY+CSYRIzHDQGG4au/dNdVcwS6 sEwQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Qg3+xKVh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id k2-20020a170902c40200b001cf5d324819si2313562plk.154.2023.11.20.02.02.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 20 Nov 2023 02:03:00 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Qg3+xKVh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id 0FD4F802AD2D; Mon, 20 Nov 2023 02:02:59 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232495AbjKTKC7 (ORCPT + 99 others); Mon, 20 Nov 2023 05:02:59 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50942 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232176AbjKTKC6 (ORCPT ); Mon, 20 Nov 2023 05:02:58 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1E1FF8F for ; Mon, 20 Nov 2023 02:02:55 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3207DC433C7; Mon, 20 Nov 2023 10:02:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1700474574; bh=cHimYpMhUep/CZIA34BYn3fN2F5JRYJOp6C9HTy9Kyg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Qg3+xKVhl3cPufNUbrh2VSLXFNldK96+YpJvA8DbDkkpeMp+Hx5ksGncTNmrmcl40 ueSj7yj7matXWd0Jclb+dv+XnCNlKTTYridjT7lcAXzl0UsJAz9jOev0hji2Bsyu51 Mzp/1zhn7NNHV2GI6uzOqUT3Gip1yGTSUq/UHXKs= Date: Mon, 20 Nov 2023 11:02:51 +0100 From: Greg KH To: Su Hui Cc: tomas.winkler@intel.com, arnd@arndb.de, nathan@kernel.org, ndesaulniers@google.com, trix@redhat.com, linux-kernel@vger.kernel.org, llvm@lists.linux.dev, kernel-janitors@vger.kernel.org Subject: Re: [PATCH v2 2/2] misc: mei: client.c: fix problem of return '-EOVERFLOW' in mei_cl_write Message-ID: <2023112042-napped-snoring-b766@gregkh> References: <20231120095523.178385-1-suhui@nfschina.com> <20231120095523.178385-2-suhui@nfschina.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231120095523.178385-2-suhui@nfschina.com> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Mon, 20 Nov 2023 02:02:59 -0800 (PST) On Mon, Nov 20, 2023 at 05:55:26PM +0800, Su Hui wrote: > Clang static analyzer complains that value stored to 'rets' is never > read.Let 'buf_len = -EOVERFLOW' to make sure we can return '-EOVERFLOW'. > > Fixes: 8c8d964ce90f ("mei: move hbuf_depth from the mei device to the hw modules") > Signed-off-by: Su Hui > --- > v2: split v1 patch to different patches > v1: https://lore.kernel.org/all/5c98fc07-36a9-92cc-f8d6-c4efdc0c34aa@nfschina.com/ > > drivers/misc/mei/client.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/misc/mei/client.c b/drivers/misc/mei/client.c > index 7ea80779a0e2..9d090fa07516 100644 > --- a/drivers/misc/mei/client.c > +++ b/drivers/misc/mei/client.c > @@ -2032,7 +2032,7 @@ ssize_t mei_cl_write(struct mei_cl *cl, struct mei_cl_cb *cb, unsigned long time > > hbuf_slots = mei_hbuf_empty_slots(dev); > if (hbuf_slots < 0) { > - rets = -EOVERFLOW; > + buf_len = -EOVERFLOW; > goto out; > } > > -- > 2.30.2 > Hi, This is the friendly patch-bot of Greg Kroah-Hartman. You have sent him a patch that has triggered this response. He used to manually respond to these common problems, but in order to save his sanity (he kept writing the same thing over and over, yet to different people), I was created. Hopefully you will not take offence and will fix the problem in your patch and resubmit it so that it can be accepted into the Linux kernel tree. You are receiving this message because of the following common error(s) as indicated below: - You have marked a patch with a "Fixes:" tag for a commit that is in an older released kernel, yet you do not have a cc: stable line in the signed-off-by area at all, which means that the patch will not be applied to any older kernel releases. To properly fix this, please follow the documented rules in the Documentation/process/stable-kernel-rules.rst file for how to resolve this. If you wish to discuss this problem further, or you have questions about how to resolve this issue, please feel free to respond to this email and Greg will reply once he has dug out from the pending patches received from other developers. thanks, greg k-h's patch email bot