:::::: :::::: Manual check reason: "low confidence static check first_new_problem: drivers/staging/iio/frequency/ad9834.c:294:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]" ::::::
BCC: [email protected] CC: [email protected] CC: [email protected] CC: [email protected] TO: Arnd Bergmann <[email protected]> CC: Masahiro Yamada <[email protected]> CC: Alex Shi <[email protected]> CC: Nick Desaulniers <[email protected]> CC: Miguel Ojeda <[email protected]> CC: Nathan Chancellor <[email protected]> tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master head: 4e23eeebb2e57f5a28b36221aa776b5a1122dde5 commit: e8c07082a810fbb9db303a2b66b66b8d7e588b53 Kbuild: move to -std=gnu11 date: 5 months ago :::::: branch date: 5 hours ago :::::: commit date: 5 months ago config: mips-randconfig-c004-20220807 (https://download.01.org/0day-ci/archive/20220808/[email protected]/config) compiler: clang version 16.0.0 (https://github.com/llvm/llvm-project 5f1c7e2cc5a3c07cbc2412e851a7283c1841f520) reproduce (this is a W=1 build): wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # install mips cross compiling tool for clang build # apt-get install binutils-mips-linux-gnu # https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c07082a810fbb9db303a2b66b66b8d7e588b53 git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git git fetch --no-tags linus master git checkout e8c07082a810fbb9db303a2b66b66b8d7e588b53 # save the config file COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=mips clang-analyzer If you fix the issue, kindly add following tag where applicable Reported-by: kernel test robot <[email protected]> clang-analyzer warnings: (new ones prefixed by >>) Suppressed 30 warnings (30 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 30 warnings generated. Suppressed 30 warnings (30 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 33 warnings generated. drivers/rtc/rtc-rs5c348.c:78:2: warning: Value stored to 'txp' is never read [clang-analyzer-deadcode.DeadStores] txp = txbuf; ^ ~~~~~ drivers/rtc/rtc-rs5c348.c:78:2: note: Value stored to 'txp' is never read txp = txbuf; ^ ~~~~~ Suppressed 32 warnings (32 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 40 warnings generated. drivers/rtc/rtc-rs5c372.c:687:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] return sprintf(buf, "%d\n", trim); ^~~~~~~ drivers/rtc/rtc-rs5c372.c:687:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 return sprintf(buf, "%d\n", trim); ^~~~~~~ drivers/rtc/rtc-rs5c372.c:700:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] return sprintf(buf, "%d.%03d KHz\n", osc / 1000, osc % 1000); ^~~~~~~ drivers/rtc/rtc-rs5c372.c:700:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 return sprintf(buf, "%d.%03d KHz\n", osc / 1000, osc % 1000); ^~~~~~~ drivers/rtc/rtc-rs5c372.c:743:2: warning: Value stored to 'addr' is never read [clang-analyzer-deadcode.DeadStores] addr = RS5C_ADDR(RS5C_REG_CTRL1); ^ drivers/rtc/rtc-rs5c372.c:743:2: note: Value stored to 'addr' is never read Suppressed 37 warnings (37 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 38 warnings generated. Suppressed 38 warnings (38 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 30 warnings generated. Suppressed 30 warnings (30 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 30 warnings generated. Suppressed 30 warnings (30 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 30 warnings generated. Suppressed 30 warnings (30 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 37 warnings generated. Suppressed 37 warnings (37 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 39 warnings generated. drivers/gpu/drm/drm_framebuffer.c:855:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy] strcpy(fb->comm, current->comm); ^~~~~~ drivers/gpu/drm/drm_framebuffer.c:855:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 strcpy(fb->comm, current->comm); ^~~~~~ Suppressed 38 warnings (38 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 34 warnings generated. drivers/auxdisplay/panel.c:1452:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] strncpy(key->u.kbd.press_str, press, sizeof(key->u.kbd.press_str)); ^~~~~~~ drivers/auxdisplay/panel.c:1452:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 strncpy(key->u.kbd.press_str, press, sizeof(key->u.kbd.press_str)); ^~~~~~~ drivers/auxdisplay/panel.c:1453:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] strncpy(key->u.kbd.repeat_str, repeat, sizeof(key->u.kbd.repeat_str)); ^~~~~~~ drivers/auxdisplay/panel.c:1453:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 strncpy(key->u.kbd.repeat_str, repeat, sizeof(key->u.kbd.repeat_str)); ^~~~~~~ drivers/auxdisplay/panel.c:1454:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] strncpy(key->u.kbd.release_str, release, ^~~~~~~ drivers/auxdisplay/panel.c:1454:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 strncpy(key->u.kbd.release_str, release, ^~~~~~~ drivers/auxdisplay/panel.c:1534:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] memset(&panel_cb, 0, sizeof(panel_cb)); ^~~~~~ drivers/auxdisplay/panel.c:1534:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 memset(&panel_cb, 0, sizeof(panel_cb)); ^~~~~~ Suppressed 30 warnings (30 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 38 warnings generated. drivers/staging/iio/cdc/ad7746.c:85:8: warning: Excessive padding in 'struct ad7746_chip_info' (228 padding bytes, where 100 is optimal). Optimal fields order: data, client, lock, config, cap_setup, vt_setup, capdac_set, capdac, consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding] struct ad7746_chip_info { ~~~~~~~^~~~~~~~~~~~~~~~~~ drivers/staging/iio/cdc/ad7746.c:85:8: note: Excessive padding in 'struct ad7746_chip_info' (228 padding bytes, where 100 is optimal). Optimal fields order: data, client, lock, config, cap_setup, vt_setup, capdac_set, capdac, consider reordering the fields or adding explicit padding members struct ad7746_chip_info { ~~~~~~~^~~~~~~~~~~~~~~~~~ Suppressed 37 warnings (37 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 41 warnings generated. drivers/staging/iio/frequency/ad9834.c:71:8: warning: Excessive padding in 'struct ad9834_state' (210 padding bytes, where 82 is optimal). Optimal fields order: data, control, spi, mclk, lock, msg, freq_msg, xfer, freq_xfer, devid, freq_data, consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding] struct ad9834_state { ~~~~~~~^~~~~~~~~~~~~~ drivers/staging/iio/frequency/ad9834.c:71:8: note: Excessive padding in 'struct ad9834_state' (210 padding bytes, where 82 is optimal). Optimal fields order: data, control, spi, mclk, lock, msg, freq_msg, xfer, freq_xfer, devid, freq_data, consider reordering the fields or adding explicit padding members struct ad9834_state { ~~~~~~~^~~~~~~~~~~~~~ >> drivers/staging/iio/frequency/ad9834.c:294:9: warning: Call to function >> 'sprintf' is insecure as it does not provide bounding of the memory buffer >> or security checks introduced in the C11 standard. Replace with analogous >> functions that support length arguments or provides boundary checks such as >> 'sprintf_s' in case of C11 >> [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] return sprintf(buf, "%s\n", str); ^~~~~~~ drivers/staging/iio/frequency/ad9834.c:294:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 return sprintf(buf, "%s\n", str); ^~~~~~~ drivers/staging/iio/frequency/ad9834.c:314:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] return sprintf(buf, "%s\n", str); ^~~~~~~ drivers/staging/iio/frequency/ad9834.c:314:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 return sprintf(buf, "%s\n", str); ^~~~~~~ Suppressed 38 warnings (38 in non-user code). Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well. 45 warnings generated. drivers/staging/iio/impedance-analyzer/ad5933.c:288:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] return sprintf(buf, "%d\n", (int)freqreg); ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:288:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 return sprintf(buf, "%d\n", (int)freqreg); ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:340:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] len = sprintf(buf, "%u\n", ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:340:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 len = sprintf(buf, "%u\n", ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:344:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] len = sprintf(buf, "%u %u %u %u\n", st->range_avail[0], ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:344:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 len = sprintf(buf, "%u %u %u %u\n", st->range_avail[0], ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:349:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] len = sprintf(buf, "%d\n", st->settling_cycles); ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:349:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 len = sprintf(buf, "%d\n", st->settling_cycles); ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:352:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] len = sprintf(buf, "%s\n", ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:352:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 len = sprintf(buf, "%s\n", ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:357:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] len = sprintf(buf, "1 0.2\n"); ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:357:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 len = sprintf(buf, "1 0.2\n"); ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:360:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling] len = sprintf(buf, "%d\n", st->freq_points); ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:360:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 len = sprintf(buf, "%d\n", st->freq_points); ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:641:11: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign] val[0] = be16_to_cpu(buf[0]); ^ drivers/staging/iio/impedance-analyzer/ad5933.c:615:6: note: Assuming the condition is false if (st->state == AD5933_CTRL_INIT_START_FREQ) { ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:615:2: note: Taking false branch if (st->state == AD5933_CTRL_INIT_START_FREQ) { ^ drivers/staging/iio/impedance-analyzer/ad5933.c:623:8: note: Calling 'ad5933_i2c_read' ret = ad5933_i2c_read(st->client, AD5933_REG_STATUS, 1, &status); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:144:2: note: Loop condition is true. Entering loop body while (len--) { ^ drivers/staging/iio/impedance-analyzer/ad5933.c:146:7: note: Assuming 'ret' is >= 0 if (ret < 0) { ^~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:146:3: note: Taking false branch if (ret < 0) { ^ drivers/staging/iio/impedance-analyzer/ad5933.c:144:2: note: Loop condition is false. Execution continues on line 152 while (len--) { ^ drivers/staging/iio/impedance-analyzer/ad5933.c:152:2: note: Returning zero, which participates in a condition later return 0; ^~~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:623:8: note: Returning from 'ad5933_i2c_read' ret = ad5933_i2c_read(st->client, AD5933_REG_STATUS, 1, &status); ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:624:6: note: 'ret' is 0 if (ret) ^~~ drivers/staging/iio/impedance-analyzer/ad5933.c:624:2: note: Taking false branch if (ret) ^ drivers/staging/iio/impedance-analyzer/ad5933.c:627:6: note: Assuming the condition is true if (status & AD5933_STAT_DATA_VALID) { ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/staging/iio/impedance-analyzer/ad5933.c:627:2: note: Taking true branch if (status & AD5933_STAT_DATA_VALID) { ^ drivers/staging/iio/impedance-analyzer/ad5933.c:631:5: note: Assuming the condition is false test_bit(1, indio_dev->active_scan_mask) ? vim +294 drivers/staging/iio/frequency/ad9834.c 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 277 01f62379a8e50a drivers/staging/iio/frequency/ad9834.c Cristina Opriceana 2015-03-14 278 static 01f62379a8e50a drivers/staging/iio/frequency/ad9834.c Cristina Opriceana 2015-03-14 279 ssize_t ad9834_show_out0_wavetype_available(struct device *dev, 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 280 struct device_attribute *attr, 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 281 char *buf) 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 282 { b671bb3bf0d016 drivers/staging/iio/frequency/ad9834.c Lars-Peter Clausen 2012-05-12 283 struct iio_dev *indio_dev = dev_to_iio_dev(dev); 638e59fc8c867b drivers/staging/iio/dds/ad9834.c Jonathan Cameron 2011-10-06 284 struct ad9834_state *st = iio_priv(indio_dev); 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 285 char *str; 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 286 9044b6e25e2fba drivers/staging/iio/frequency/ad9834.c Melissa Wen 2019-04-02 287 if (st->devid == ID_AD9833 || st->devid == ID_AD9837) 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 288 str = "sine triangle square"; 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 289 else if (st->control & AD9834_OPBITEN) 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 290 str = "sine"; 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 291 else 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 292 str = "sine triangle"; 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 293 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 @294 return sprintf(buf, "%s\n", str); 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 295 } 12b9d5bf76bfa2 drivers/staging/iio/dds/ad9834.c Michael Hennerich 2010-12-14 296 :::::: The code at line 294 was first introduced by commit :::::: 12b9d5bf76bfa20d3207ef24fca9c8254a586a58 Staging: IIO: DDS: AD9833 / AD9834 driver :::::: TO: Michael Hennerich <[email protected]> :::::: CC: Greg Kroah-Hartman <[email protected]> -- 0-DAY CI Kernel Test Service https://01.org/lkp _______________________________________________ kbuild mailing list -- [email protected] To unsubscribe send an email to [email protected]
