CC: [email protected] CC: [email protected] BCC: [email protected] In-Reply-To: <[email protected]> References: <[email protected]> TO: Ian Cowan <[email protected]> TO: [email protected] CC: [email protected] CC: [email protected] CC: [email protected] CC: [email protected] CC: [email protected] CC: [email protected] CC: [email protected]
Hi Ian, Thank you for the patch! Perhaps something to improve: [auto build test WARNING on staging/staging-testing] url: https://github.com/intel-lab-lkp/linux/commits/Ian-Cowan/staging-media-zoran-add-zrdev_dbg-macros/20220425-092814 base: https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/staging.git 1efba7ef1d7da5944493728c5375fef5b2130de4 :::::: branch date: 11 days ago :::::: commit date: 11 days ago config: riscv-randconfig-c006-20220505 (https://download.01.org/0day-ci/archive/20220506/[email protected]/config) compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 5e004fb787698440a387750db7f8028e7cb14cfc) reproduce (this is a W=1 build): wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # install riscv cross compiling tool for clang build # apt-get install binutils-riscv64-linux-gnu # https://github.com/intel-lab-lkp/linux/commit/6febc7a1b1d282fb5090a6a6f6945dce452bce98 git remote add linux-review https://github.com/intel-lab-lkp/linux git fetch --no-tags linux-review Ian-Cowan/staging-media-zoran-add-zrdev_dbg-macros/20220425-092814 git checkout 6febc7a1b1d282fb5090a6a6f6945dce452bce98 # save the config file COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=riscv clang-analyzer If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot <[email protected]> clang-analyzer warnings: (new ones prefixed by >>) ^~~~~~ net/ethtool/ioctl.c:576:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 memset(&link_ksettings, 0, sizeof(link_ksettings)); ^~~~~~ net/ethtool/ioctl.c:676:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memset(&link_ksettings, 0, sizeof(link_ksettings)); ^~~~~~ net/ethtool/ioctl.c:676:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 memset(&link_ksettings, 0, sizeof(link_ksettings)); ^~~~~~ net/ethtool/ioctl.c:797:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memset(&info, 0, sizeof(info)); ^~~~~~ net/ethtool/ioctl.c:797:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 memset(&info, 0, sizeof(info)); ^~~~~~ net/ethtool/ioctl.c:898:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memset(&crxnfc, 0, sizeof(crxnfc)); ^~~~~~ net/ethtool/ioctl.c:898:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 memset(&crxnfc, 0, sizeof(crxnfc)); ^~~~~~ net/ethtool/ioctl.c:1064:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(buffer, netdev_rss_key, len); ^~~~~~ net/ethtool/ioctl.c:1064:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(buffer, netdev_rss_key, len); ^~~~~~ net/ethtool/ioctl.c:1439:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memset(&wol, 0, sizeof(struct ethtool_wolinfo)); ^~~~~~ net/ethtool/ioctl.c:1439:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 memset(&wol, 0, sizeof(struct ethtool_wolinfo)); ^~~~~~ net/ethtool/ioctl.c:1477:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memset(&edata, 0, sizeof(struct ethtool_eee)); ^~~~~~ net/ethtool/ioctl.c:1477:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 memset(&edata, 0, sizeof(struct ethtool_eee)); ^~~~~~ net/ethtool/ioctl.c:1981:2: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] vsnprintf(*data, ETH_GSTRING_LEN, fmt, args); ^~~~~~~~~ net/ethtool/ioctl.c:1981:2: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 vsnprintf(*data, ETH_GSTRING_LEN, fmt, args); ^~~~~~~~~ net/ethtool/ioctl.c:2270:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memset(&tmp, 0, sizeof(tmp)); ^~~~~~ net/ethtool/ioctl.c:2270:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 memset(&tmp, 0, sizeof(tmp)); ^~~~~~ net/ethtool/ioctl.c:3210:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(&match->key.ipv6.src, v6_spec->ip6src, ^~~~~~ net/ethtool/ioctl.c:3210:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(&match->key.ipv6.src, v6_spec->ip6src, ^~~~~~ net/ethtool/ioctl.c:3212:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(&match->mask.ipv6.src, v6_m_spec->ip6src, ^~~~~~ net/ethtool/ioctl.c:3212:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(&match->mask.ipv6.src, v6_m_spec->ip6src, ^~~~~~ net/ethtool/ioctl.c:3216:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(&match->key.ipv6.dst, v6_spec->ip6dst, ^~~~~~ net/ethtool/ioctl.c:3216:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(&match->key.ipv6.dst, v6_spec->ip6dst, ^~~~~~ net/ethtool/ioctl.c:3218:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(&match->mask.ipv6.dst, v6_m_spec->ip6dst, ^~~~~~ net/ethtool/ioctl.c:3218:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(&match->mask.ipv6.dst, v6_m_spec->ip6dst, ^~~~~~ net/ethtool/ioctl.c:3313:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(match->key.eth_addrs.dst, ext_h_spec->h_dest, ^~~~~~ net/ethtool/ioctl.c:3313:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(match->key.eth_addrs.dst, ext_h_spec->h_dest, ^~~~~~ net/ethtool/ioctl.c:3315:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(match->mask.eth_addrs.dst, ext_m_spec->h_dest, ^~~~~~ net/ethtool/ioctl.c:3315:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(match->mask.eth_addrs.dst, ext_m_spec->h_dest, ^~~~~~ Suppressed 88 warnings (81 in non-user code, 7 with check filters). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 61 warnings generated. drivers/staging/media/zoran/videocodec.c:69:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] snprintf(codec->name + res, sizeof(codec->name) - res, "[%d]", h->attached); ^~~~~~~~ drivers/staging/media/zoran/videocodec.c:69:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 snprintf(codec->name + res, sizeof(codec->name) - res, "[%d]", h->attached); ^~~~~~~~ Suppressed 60 warnings (53 in non-user code, 7 with check filters). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 72 warnings generated. >> drivers/staging/media/zoran/zr36060.c:97:16: warning: Value stored to 'zr' >> during its initialization is never read [clang-analyzer-deadcode.DeadStores] struct zoran *zr = videocodec_to_zoran(ptr->codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:97:16: note: Value stored to 'zr' during its initialization is never read struct zoran *zr = videocodec_to_zoran(ptr->codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:133:16: warning: Value stored to 'zr' during its initialization is never read [clang-analyzer-deadcode.DeadStores] struct zoran *zr = videocodec_to_zoran(ptr->codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:133:16: note: Value stored to 'zr' during its initialization is never read struct zoran *zr = videocodec_to_zoran(ptr->codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:248:16: warning: Value stored to 'zr' during its initialization is never read [clang-analyzer-deadcode.DeadStores] struct zoran *zr = videocodec_to_zoran(ptr->codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:248:16: note: Value stored to 'zr' during its initialization is never read struct zoran *zr = videocodec_to_zoran(ptr->codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:277:16: warning: Value stored to 'zr' during its initialization is never read [clang-analyzer-deadcode.DeadStores] struct zoran *zr = videocodec_to_zoran(ptr->codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:277:16: note: Value stored to 'zr' during its initialization is never read struct zoran *zr = videocodec_to_zoran(ptr->codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:303:16: warning: Value stored to 'zr' during its initialization is never read [clang-analyzer-deadcode.DeadStores] struct zoran *zr = videocodec_to_zoran(ptr->codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:303:16: note: Value stored to 'zr' during its initialization is never read struct zoran *zr = videocodec_to_zoran(ptr->codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:463:16: warning: Value stored to 'zr' during its initialization is never read [clang-analyzer-deadcode.DeadStores] struct zoran *zr = videocodec_to_zoran(codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:463:16: note: Value stored to 'zr' during its initialization is never read struct zoran *zr = videocodec_to_zoran(codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:481:16: warning: Value stored to 'zr' during its initialization is never read [clang-analyzer-deadcode.DeadStores] struct zoran *zr = videocodec_to_zoran(codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:481:16: note: Value stored to 'zr' during its initialization is never read struct zoran *zr = videocodec_to_zoran(codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:641:16: warning: Value stored to 'zr' during its initialization is never read [clang-analyzer-deadcode.DeadStores] struct zoran *zr = videocodec_to_zoran(codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:641:16: note: Value stored to 'zr' during its initialization is never read struct zoran *zr = videocodec_to_zoran(codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:758:16: warning: Value stored to 'zr' during its initialization is never read [clang-analyzer-deadcode.DeadStores] struct zoran *zr = videocodec_to_zoran(codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:758:16: note: Value stored to 'zr' during its initialization is never read struct zoran *zr = videocodec_to_zoran(codec); ^~ ~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/media/zoran/zr36060.c:799:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] snprintf(ptr->name, sizeof(ptr->name), "zr36060[%d]", zr36060_codecs); ^~~~~~~~ drivers/staging/media/zoran/zr36060.c:799:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 snprintf(ptr->name, sizeof(ptr->name), "zr36060[%d]", zr36060_codecs); ^~~~~~~~ drivers/staging/media/zoran/zr36060.c:810:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(ptr->h_samp_ratio, zr36060_decimation_h, 8); ^~~~~~ drivers/staging/media/zoran/zr36060.c:810:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(ptr->h_samp_ratio, zr36060_decimation_h, 8); ^~~~~~ drivers/staging/media/zoran/zr36060.c:811:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memcpy(ptr->v_samp_ratio, zr36060_decimation_v, 8); ^~~~~~ drivers/staging/media/zoran/zr36060.c:811:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 memcpy(ptr->v_samp_ratio, zr36060_decimation_v, 8); ^~~~~~ Suppressed 60 warnings (53 in non-user code, 7 with check filters). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 3 warnings generated. kernel/bpf/tnum.c:177:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] return snprintf(str, size, "(%#llx; %#llx)", a.value, a.mask); ^~~~~~~~ kernel/bpf/tnum.c:177:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 return snprintf(str, size, "(%#llx; %#llx)", a.value, a.mask); ^~~~~~~~ Suppressed 2 warnings (2 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 89 warnings generated. kernel/bpf/bpf_iter.c:514:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memset(&linfo, 0, sizeof(union bpf_iter_link_info)); ^~~~~~ kernel/bpf/bpf_iter.c:514:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 memset(&linfo, 0, sizeof(union bpf_iter_link_info)); ^~~~~~ Suppressed 88 warnings (81 in non-user code, 7 with check filters). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 88 warnings generated. Suppressed 88 warnings (81 in non-user code, 7 with check filters). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 88 warnings generated. Suppressed 88 warnings (81 in non-user code, 7 with check filters). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 130 warnings generated. net/ipv4/cipso_ipv4.c:134:2: warning: 1st function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage] if (entry->lsm_data) vim +/zr +97 drivers/staging/media/zoran/zr36060.c 61c3b19f7b9eb7 Corentin Labbe 2020-09-25 93 5e195bbddabdd9 Corentin Labbe 2020-09-25 94 /* wait if codec is ready to proceed (end of processing) or time is over */ 5e195bbddabdd9 Corentin Labbe 2020-09-25 95 static void zr36060_wait_end(struct zr36060 *ptr) 61c3b19f7b9eb7 Corentin Labbe 2020-09-25 96 { 6febc7a1b1d282 Ian Cowan 2022-04-23 @97 struct zoran *zr = videocodec_to_zoran(ptr->codec); 61c3b19f7b9eb7 Corentin Labbe 2020-09-25 98 int i = 0; 61c3b19f7b9eb7 Corentin Labbe 2020-09-25 99 c602f29dd17cad Mauro Carvalho Chehab 2020-10-01 100 while (zr36060_read_status(ptr) & ZR060_CFSR_BUSY) { 61c3b19f7b9eb7 Corentin Labbe 2020-09-25 101 udelay(1); 61c3b19f7b9eb7 Corentin Labbe 2020-09-25 102 if (i++ > 200000) { // 200ms, there is for sure something wrong!!! 6febc7a1b1d282 Ian Cowan 2022-04-23 103 zrdev_dbg(zr, "%s: timeout at wait_end (last status: 0x%02x)\n", 61c3b19f7b9eb7 Corentin Labbe 2020-09-25 104 ptr->name, ptr->status); 61c3b19f7b9eb7 Corentin Labbe 2020-09-25 105 break; 61c3b19f7b9eb7 Corentin Labbe 2020-09-25 106 } 61c3b19f7b9eb7 Corentin Labbe 2020-09-25 107 } 61c3b19f7b9eb7 Corentin Labbe 2020-09-25 108 } 61c3b19f7b9eb7 Corentin Labbe 2020-09-25 109 -- 0-DAY CI Kernel Test Service https://01.org/lkp _______________________________________________ kbuild mailing list -- [email protected] To unsubscribe send an email to [email protected]
