Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp13468616ybl; Sun, 29 Dec 2019 12:37:07 -0800 (PST) X-Google-Smtp-Source: APXvYqxsTsV3f2LevMP2eo4bNbjuk5MXmh8O+zCI1sQvNz4PtJeGB2TKlq46+ybQVuXZ2Pp+dDUB X-Received: by 2002:a05:6830:10d5:: with SMTP id z21mr73178554oto.30.1577651827423; Sun, 29 Dec 2019 12:37:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577651827; cv=none; d=google.com; s=arc-20160816; b=N+zsObG/N0ttLD/gd3cas/EVUHSbPt9Hep8si2eyM44ghgwsg1XPdVPKUuIuVNI+Rd sHDbPOSDSndyH9EPr0zSOq7svtsdT3Uq7oSNkWA6JLOpr5U8sRMITQBrUtHw8fmsChGI 0oBh7rWgVoPpVYAxzKCGs1f/GkRUZU/xK1cjVOQwDtctYK8U8fEU5BpQkJqQ3Yo2rKEr HzeUqxyorZIKCydrHUZUe/10X56Ami5bWe6Xxbnqn6Fpd0mppa8KUnpKmh9T1MQ73Ve4 JmQ8y8qZjPNwyknALCRQoDGzUEHDElzsXXyT06nDHgUky8I0y9uGmb7rNJZTzMXI4QZn vTBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=wbJkQoP9qIeyYc9pfg702SuZJ062okkcfr/nQI9EMlc=; b=JXohyXa/f4gfJtKvByMOnAcTspr7b9OVp8dlmSFc57bvp6l/UilnUa3ORc8ILUXS87 x0cM2TC/mr93ISnhqN2bWVOXwdJNm0iH398gPqgAO+A1WxpsczxoEXzUfG8wtFS1+h+c Xse4fUOPioJ/aC/cDOZjjuzc4txGhLfklNEhoRT8aMeAl0VTXVNUs52y5lXYKE5iyggW xWJU9DZEyDuDXuSWXDpaKtQkwMGM0ErEbsclbdpOSh4MgV1s3kUaFnRipW9SyjhaOnHq b0422zVQOl2+QtTpTA369c1Q+ZpKiinhoh4ro60+qAyxI1KnU7cwBE/ZetnAqpRM7X9l 6LZA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=daDGsU42; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t12si21477795otm.224.2019.12.29.12.36.56; Sun, 29 Dec 2019 12:37:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=daDGsU42; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729778AbfL2Rew (ORCPT + 99 others); Sun, 29 Dec 2019 12:34:52 -0500 Received: from mail.kernel.org ([198.145.29.99]:38356 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729717AbfL2Req (ORCPT ); Sun, 29 Dec 2019 12:34:46 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2956D206DB; Sun, 29 Dec 2019 17:34:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1577640885; bh=8pxzieCgI+tA0pQaNOHwARrjHhW9WxTRdxKBRkyU30w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=daDGsU420ZNhVATFoCA9WO7edtIyA9uGoZyzm1tjNtz6CQNezTnpPDiwBYJWZYiBZ zb1j3cpcqUHV18fTHaIf3hYjgqo03fXsVlhFz8armUfl0sR1+APdzXwhFks5jPgGmo JR02zEW1U4pPeR7l8zoXQ7kZZI/EiI1yZ0Pt4+kQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Herbert Xu , Corentin Labbe , Sasha Levin Subject: [PATCH 4.19 180/219] crypto: sun4i-ss - Fix 64-bit size_t warnings Date: Sun, 29 Dec 2019 18:19:42 +0100 Message-Id: <20191229162536.066360664@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191229162508.458551679@linuxfoundation.org> References: <20191229162508.458551679@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Herbert Xu [ Upstream commit d6e9da21ee8246b5e556b3b153401ab045adb986 ] If you try to compile this driver on a 64-bit platform then you will get warnings because it mixes size_t with unsigned int which only works on 32-bit. This patch fixes all of the warnings. Signed-off-by: Herbert Xu Acked-by: Corentin Labbe Tested-by: Corentin Labbe Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/sunxi-ss/sun4i-ss-cipher.c | 22 ++++++++++++++-------- 1 file changed, 14 insertions(+), 8 deletions(-) diff --git a/drivers/crypto/sunxi-ss/sun4i-ss-cipher.c b/drivers/crypto/sunxi-ss/sun4i-ss-cipher.c index 5cf64746731a..22e491857925 100644 --- a/drivers/crypto/sunxi-ss/sun4i-ss-cipher.c +++ b/drivers/crypto/sunxi-ss/sun4i-ss-cipher.c @@ -81,7 +81,8 @@ static int sun4i_ss_opti_poll(struct skcipher_request *areq) oi = 0; oo = 0; do { - todo = min3(rx_cnt, ileft, (mi.length - oi) / 4); + todo = min(rx_cnt, ileft); + todo = min_t(size_t, todo, (mi.length - oi) / 4); if (todo) { ileft -= todo; writesl(ss->base + SS_RXFIFO, mi.addr + oi, todo); @@ -96,7 +97,8 @@ static int sun4i_ss_opti_poll(struct skcipher_request *areq) rx_cnt = SS_RXFIFO_SPACES(spaces); tx_cnt = SS_TXFIFO_SPACES(spaces); - todo = min3(tx_cnt, oleft, (mo.length - oo) / 4); + todo = min(tx_cnt, oleft); + todo = min_t(size_t, todo, (mo.length - oo) / 4); if (todo) { oleft -= todo; readsl(ss->base + SS_TXFIFO, mo.addr + oo, todo); @@ -220,7 +222,8 @@ static int sun4i_ss_cipher_poll(struct skcipher_request *areq) * todo is the number of consecutive 4byte word that we * can read from current SG */ - todo = min3(rx_cnt, ileft / 4, (mi.length - oi) / 4); + todo = min(rx_cnt, ileft / 4); + todo = min_t(size_t, todo, (mi.length - oi) / 4); if (todo && !ob) { writesl(ss->base + SS_RXFIFO, mi.addr + oi, todo); @@ -234,8 +237,8 @@ static int sun4i_ss_cipher_poll(struct skcipher_request *areq) * we need to be able to write all buf in one * pass, so it is why we min() with rx_cnt */ - todo = min3(rx_cnt * 4 - ob, ileft, - mi.length - oi); + todo = min(rx_cnt * 4 - ob, ileft); + todo = min_t(size_t, todo, mi.length - oi); memcpy(buf + ob, mi.addr + oi, todo); ileft -= todo; oi += todo; @@ -255,7 +258,8 @@ static int sun4i_ss_cipher_poll(struct skcipher_request *areq) spaces = readl(ss->base + SS_FCSR); rx_cnt = SS_RXFIFO_SPACES(spaces); tx_cnt = SS_TXFIFO_SPACES(spaces); - dev_dbg(ss->dev, "%x %u/%u %u/%u cnt=%u %u/%u %u/%u cnt=%u %u\n", + dev_dbg(ss->dev, + "%x %u/%zu %u/%u cnt=%u %u/%zu %u/%u cnt=%u %u\n", mode, oi, mi.length, ileft, areq->cryptlen, rx_cnt, oo, mo.length, oleft, areq->cryptlen, tx_cnt, ob); @@ -263,7 +267,8 @@ static int sun4i_ss_cipher_poll(struct skcipher_request *areq) if (!tx_cnt) continue; /* todo in 4bytes word */ - todo = min3(tx_cnt, oleft / 4, (mo.length - oo) / 4); + todo = min(tx_cnt, oleft / 4); + todo = min_t(size_t, todo, (mo.length - oo) / 4); if (todo) { readsl(ss->base + SS_TXFIFO, mo.addr + oo, todo); oleft -= todo * 4; @@ -287,7 +292,8 @@ static int sun4i_ss_cipher_poll(struct skcipher_request *areq) * no more than remaining buffer * no need to test against oleft */ - todo = min(mo.length - oo, obl - obo); + todo = min_t(size_t, + mo.length - oo, obl - obo); memcpy(mo.addr + oo, bufo + obo, todo); oleft -= todo; obo += todo; -- 2.20.1