From mboxrd@z Thu Jan 1 00:00:00 1970 From: Thomas Monjalon Subject: Re: [PATCH 0/3] Various patches Date: Wed, 14 May 2014 11:26:10 +0200 Message-ID: <2904402.ZJ66rxsSku@xps13> References: <1399908911-18829-1-git-send-email-julien.cretin@trust-in-soft.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7Bit Cc: dev-VfR2kkLFssw@public.gmane.org To: Julien Cretin Return-path: In-Reply-To: <1399908911-18829-1-git-send-email-julien.cretin-5/pgmGDL2QNYvNUnsyAbJwC/G2K4zDHf@public.gmane.org> List-Id: patches and discussions about DPDK List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces-VfR2kkLFssw@public.gmane.org Sender: "dev" 2014-05-12 17:35, Julien Cretin: > This patch set contains three unrelated patches found by running > TrustInSoft Analyzer [1] on some parts of the testpmd application: > > - The first patch fixes a minor signed overflow in a constant > expression of testpmd. > > - The second patch is not a fix and concerns a suspicious loop > condition in optimize_object_size. > > - The third (and last) patch fixes sign mismatches for some printf > arguments. > > [1] TrustInSoft Analyzer (http://trust-in-soft.com) is a static > analyzer. And as such, it gives information about the execution of a > source code without actually running it. However, unlike other static > analysis tools, it has the particularity of being correct. This means > that it does not remain silent when a run-time error may happen in the > range of the analysis. In other words, it gives information about all > possible executions (defined by the analysis) of a source code without > actually running it. > > Julien Cretin (3): > app/testpmd: fix minor signed overflow in a constant > mem: remove redundant check in optimize_object_size > app/testpmd: fix incompatible sign for printf arguments Acked-by: Thomas Monjalon Applied for version 1.7.0. Thanks for these difficult catches, especially the mempool/get_gcd one! -- Thomas