Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp13369734ybl; Sun, 29 Dec 2019 10:15:28 -0800 (PST) X-Google-Smtp-Source: APXvYqyqftRtirq0SQrArChxiU5m7Yv0/h0A9VgdhHwPN50UNMjn4RIIL2HdcW+PHSyXBXrY48VX X-Received: by 2002:a9d:754a:: with SMTP id b10mr70786884otl.273.1577643328209; Sun, 29 Dec 2019 10:15:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577643328; cv=none; d=google.com; s=arc-20160816; b=C630dmfn2DYBYylnOtG98BpmTdgKzkL3n7AQrUKqIHq1q0lNsIU9irr140sPwikmlS 5syFKGnEFDEhMBHy5bKKs4THmZK2aPXixmXvZwY1Nx1VZE6ODFURnUDraljjG/E3+56n iYnzKq0S0wIsnYRx/G3dIKO3/d2h7APTGe3IPgGY1U2WVs21m4I+OZx14/jMXcfY4Ji7 uth15e7PmRSqFwEIvm7ahytW5yQzHMrykWdZce8zpr5BRI2PRqnb7tY0kUGv2Dver/Af AmTHftvwbIqRpRRA/hnKmye0R14H85wuebscX+Uzj1PKrfoxQ7inFJaLV0hxoa4M9LHx /kLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=wbJkQoP9qIeyYc9pfg702SuZJ062okkcfr/nQI9EMlc=; b=IrF/2P4uwKc/rfyK1iJ9FR375vxgygO2yc1E2/FgcruGuKg1mTMWjNay5tHFlogtEU lwKahZ/qneiRIsK8B/GsSravSr+/Urj7KZxHaRq9eq6+XXOTBHmM6F1nmlq3VVC7YC6g cGq7tLCUGOj2bhd8t8hVEqpLxxIe9rF2VNHK9ZUkfKCmDCPE76EFU1OMFe7AP/NY7n7z /0DxJj+IANVNMhg+REeYsfVHfq3VRgqff4YFwWzFwpzlT6TXjZvIagenYg2zdr3XiuE9 BFTYQyYmtSzHaWpqiVIBa93h0O92H9ZSvI+qyygnlPiJs9fgznOKHLEflfwNVf/4aSGi 4v+A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wPktbfCf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p3si20787824oih.186.2019.12.29.10.15.16; Sun, 29 Dec 2019 10:15:28 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wPktbfCf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727956AbfL2R1p (ORCPT + 99 others); Sun, 29 Dec 2019 12:27:45 -0500 Received: from mail.kernel.org ([198.145.29.99]:50280 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728468AbfL2R1n (ORCPT ); Sun, 29 Dec 2019 12:27:43 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 348AF20722; Sun, 29 Dec 2019 17:27:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1577640462; bh=8pxzieCgI+tA0pQaNOHwARrjHhW9WxTRdxKBRkyU30w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wPktbfCfA7xl/f2iIT4R3YqSONMnZVGV9TiPYNOY35xgdZS90pbVHpIdu5rtfpJGL ILSCkBPxdwJzPnyv4my9ji6MzewRfy2osZ4k7hTy6m8mqXFazzvRTrJLofQcnT2EWp Jp8fbJ7Dum+DJzLRoklKietyW4NCw/s7WIhbtxy0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Herbert Xu , Corentin Labbe , Sasha Levin Subject: [PATCH 4.14 129/161] crypto: sun4i-ss - Fix 64-bit size_t warnings Date: Sun, 29 Dec 2019 18:19:37 +0100 Message-Id: <20191229162438.025299280@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191229162355.500086350@linuxfoundation.org> References: <20191229162355.500086350@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Herbert Xu [ Upstream commit d6e9da21ee8246b5e556b3b153401ab045adb986 ] If you try to compile this driver on a 64-bit platform then you will get warnings because it mixes size_t with unsigned int which only works on 32-bit. This patch fixes all of the warnings. Signed-off-by: Herbert Xu Acked-by: Corentin Labbe Tested-by: Corentin Labbe Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/sunxi-ss/sun4i-ss-cipher.c | 22 ++++++++++++++-------- 1 file changed, 14 insertions(+), 8 deletions(-) diff --git a/drivers/crypto/sunxi-ss/sun4i-ss-cipher.c b/drivers/crypto/sunxi-ss/sun4i-ss-cipher.c index 5cf64746731a..22e491857925 100644 --- a/drivers/crypto/sunxi-ss/sun4i-ss-cipher.c +++ b/drivers/crypto/sunxi-ss/sun4i-ss-cipher.c @@ -81,7 +81,8 @@ static int sun4i_ss_opti_poll(struct skcipher_request *areq) oi = 0; oo = 0; do { - todo = min3(rx_cnt, ileft, (mi.length - oi) / 4); + todo = min(rx_cnt, ileft); + todo = min_t(size_t, todo, (mi.length - oi) / 4); if (todo) { ileft -= todo; writesl(ss->base + SS_RXFIFO, mi.addr + oi, todo); @@ -96,7 +97,8 @@ static int sun4i_ss_opti_poll(struct skcipher_request *areq) rx_cnt = SS_RXFIFO_SPACES(spaces); tx_cnt = SS_TXFIFO_SPACES(spaces); - todo = min3(tx_cnt, oleft, (mo.length - oo) / 4); + todo = min(tx_cnt, oleft); + todo = min_t(size_t, todo, (mo.length - oo) / 4); if (todo) { oleft -= todo; readsl(ss->base + SS_TXFIFO, mo.addr + oo, todo); @@ -220,7 +222,8 @@ static int sun4i_ss_cipher_poll(struct skcipher_request *areq) * todo is the number of consecutive 4byte word that we * can read from current SG */ - todo = min3(rx_cnt, ileft / 4, (mi.length - oi) / 4); + todo = min(rx_cnt, ileft / 4); + todo = min_t(size_t, todo, (mi.length - oi) / 4); if (todo && !ob) { writesl(ss->base + SS_RXFIFO, mi.addr + oi, todo); @@ -234,8 +237,8 @@ static int sun4i_ss_cipher_poll(struct skcipher_request *areq) * we need to be able to write all buf in one * pass, so it is why we min() with rx_cnt */ - todo = min3(rx_cnt * 4 - ob, ileft, - mi.length - oi); + todo = min(rx_cnt * 4 - ob, ileft); + todo = min_t(size_t, todo, mi.length - oi); memcpy(buf + ob, mi.addr + oi, todo); ileft -= todo; oi += todo; @@ -255,7 +258,8 @@ static int sun4i_ss_cipher_poll(struct skcipher_request *areq) spaces = readl(ss->base + SS_FCSR); rx_cnt = SS_RXFIFO_SPACES(spaces); tx_cnt = SS_TXFIFO_SPACES(spaces); - dev_dbg(ss->dev, "%x %u/%u %u/%u cnt=%u %u/%u %u/%u cnt=%u %u\n", + dev_dbg(ss->dev, + "%x %u/%zu %u/%u cnt=%u %u/%zu %u/%u cnt=%u %u\n", mode, oi, mi.length, ileft, areq->cryptlen, rx_cnt, oo, mo.length, oleft, areq->cryptlen, tx_cnt, ob); @@ -263,7 +267,8 @@ static int sun4i_ss_cipher_poll(struct skcipher_request *areq) if (!tx_cnt) continue; /* todo in 4bytes word */ - todo = min3(tx_cnt, oleft / 4, (mo.length - oo) / 4); + todo = min(tx_cnt, oleft / 4); + todo = min_t(size_t, todo, (mo.length - oo) / 4); if (todo) { readsl(ss->base + SS_TXFIFO, mo.addr + oo, todo); oleft -= todo * 4; @@ -287,7 +292,8 @@ static int sun4i_ss_cipher_poll(struct skcipher_request *areq) * no more than remaining buffer * no need to test against oleft */ - todo = min(mo.length - oo, obl - obo); + todo = min_t(size_t, + mo.length - oo, obl - obo); memcpy(mo.addr + oo, bufo + obo, todo); oleft -= todo; obo += todo; -- 2.20.1