Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp7152831ybi; Mon, 8 Jul 2019 15:42:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqxqVTPjWbkh6I8VQkiyXkTuoiulQxiG6bDC4mMs7w2KqZQZlrojBk0UHUoh6ThCxs3WqfwE X-Received: by 2002:a63:374a:: with SMTP id g10mr26222690pgn.31.1562625775270; Mon, 08 Jul 2019 15:42:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562625775; cv=none; d=google.com; s=arc-20160816; b=HNRjLAA5lK0twTKZVgZq8eVCL+wlJtih8Anr7S2EO+15Ial7G7C/ZI0ctpSEvIbumd kaL8YiG4F8KoXeBqDyVYRg0iPtzhd26qamy/ucTABnVc+xfgug5jIIgiyPyXSZY6OeNj DBPrbuPOaQwqdrXof3lZrZkpHNqjZh/uxUc5WO1ylzoJmawOCqU0t2aW6GL47GPYrohp 2xy0zJUqkfTJvFJS54iclx6oic66ycaaI9pbZCDIFRuSk908CaiBaLlwh+P0Kpm6v4J1 HIERGoMZsM7k0uf/V47XKqRZ0X8p2YIbOC0eX0TnmngyGQRL982g3qJRnRw3Ru0Si57o rR3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=mNbVWAeyS7qovVwkR47xgK68P5m2w701Vy+aXNq3HDk=; b=BrCYYFy7bjsGsFQdh0Lt7i8Mj7xHME0uMhZUfJmqcWWFfATA18t5HeM5yfRXOGjDSK uPRu5w0L1RpocI0BqZbjKwz/64vYADOAb4aukhmOA2QCjcdCQXzfbIsD1FD4UOnIEL9l 32T2w5WpCrMqTKDOeYP/QKP3goZpqMqX0iRUZBNla+EyvcV3OVQ7SqFpcDB4s9cQNsLn U5PQyZ5ORjTXXhoS3XFI9QJsqJAsiv46nHA9rl4tUXZySY8eipjLFAorgSvCAG94r/7Y OJ5M94T+YXBikCKbRLhc0xlLww/OOvhp4N4dc7mup2fofi0q4NeUcX+8koJn/6ttXQwj GENQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RRodN9cE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c13si699283pjo.75.2019.07.08.15.42.40; Mon, 08 Jul 2019 15:42:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RRodN9cE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732894AbfGHPs7 (ORCPT + 99 others); Mon, 8 Jul 2019 11:48:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:40692 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732799AbfGHPRX (ORCPT ); Mon, 8 Jul 2019 11:17:23 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BF29A21707; Mon, 8 Jul 2019 15:17:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1562599042; bh=GOQxWeZsz605KEGKjrEskT5ZXPhExynzzn/kr1UpyCk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RRodN9cErH0xoiryrMm8pQE3W3jh6tT4sVChZy5z+qa91clIN/cBEY8Ddi2Clrjwu OTda9/8BuOni9yIphG4wnpqkI/bqGYes0zX3whd8UxqAhw3rIKspDv2AfUCIIKmRBP BlVlhKX5h37bgRSFq8S8m0KLtBy5MJjSWN7VQkW8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Arnd Bergmann , Lee Jones , Sasha Levin Subject: [PATCH 4.4 58/73] mfd: omap-usb-tll: Fix register offsets Date: Mon, 8 Jul 2019 17:13:08 +0200 Message-Id: <20190708150524.402102929@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190708150513.136580595@linuxfoundation.org> References: <20190708150513.136580595@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 993dc737c0996c163325961fb62a0ed9fd0308b4 ] gcc-8 notices that the register number calculation is wrong when the offset is an 'u8' but the number is larger than 256: drivers/mfd/omap-usb-tll.c: In function 'omap_tll_init': drivers/mfd/omap-usb-tll.c:90:46: error: overflow in conversion from 'int' to 'u8 {aka unsigned char}' chages value from 'i * 256 + 2070' to '22' [-Werror=overflow] This addresses it by always using a 32-bit offset number for the register. This is apparently an old problem that previous compilers did not find. Fixes: 16fa3dc75c22 ("mfd: omap-usb-tll: HOST TLL platform driver") Signed-off-by: Arnd Bergmann Signed-off-by: Lee Jones Signed-off-by: Sasha Levin --- drivers/mfd/omap-usb-tll.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/mfd/omap-usb-tll.c b/drivers/mfd/omap-usb-tll.c index fe51e9709210..1093d8ad232b 100644 --- a/drivers/mfd/omap-usb-tll.c +++ b/drivers/mfd/omap-usb-tll.c @@ -129,12 +129,12 @@ static inline u32 usbtll_read(void __iomem *base, u32 reg) return readl_relaxed(base + reg); } -static inline void usbtll_writeb(void __iomem *base, u8 reg, u8 val) +static inline void usbtll_writeb(void __iomem *base, u32 reg, u8 val) { writeb_relaxed(val, base + reg); } -static inline u8 usbtll_readb(void __iomem *base, u8 reg) +static inline u8 usbtll_readb(void __iomem *base, u32 reg) { return readb_relaxed(base + reg); } -- 2.20.1