Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1619770ybv; Fri, 21 Feb 2020 00:25:13 -0800 (PST) X-Google-Smtp-Source: APXvYqw1rM/arEboOph0tgobV+AYZobSeZz4XRCbC67s5Wehdn/xAcxa3MaomcQCcFzwvinxfKw+ X-Received: by 2002:aca:ab52:: with SMTP id u79mr941462oie.145.1582273513503; Fri, 21 Feb 2020 00:25:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582273513; cv=none; d=google.com; s=arc-20160816; b=rG1KZeYFi05S8eAXv8AiGbk/LmcqOstIJ4C4TUyul/Lpgl1qrM7T5hNrbJdSBYG2ZX xPkDiEUWKbzFeQt9xebU8EEX2OmyG9S/67ZeMLmiU5s205DUNTMbPkyL7UBGQfW3pdrT uM7ye+XWzMhlpt5leioXo2NVkx0vmtSEjnOky28sYtnbUwIbRIqEEkU/QFMDD3/RrR9I ulTmCSm2pzudyLYMvP/L1Uo7nAJaK2XlEfzLNKugKyF32VZH+gyn1FF2zFYgVYGg2DZb p7sg/DgLfgy+xrI2V1ViSzP9XOZw9P36saxD7rH1zeFCAxVf3oYjT/YA7FocievrVRzA Xx+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=m/8Z4X+F7Zx4hH9/tmsOylSydskC4o/q1sq6txLR1aY=; b=N8Oh9Wgprubq02phF/9aAtD8DXxLK5kF2YJeU1sSdX9+ajatPGJ7Fafqa7jvfUf7zN bguCS1U+3FUyX3FZxDhvLirLjHjZp1iOihX82/P67zMeBWjRuwQgbLb3NY4JXTXilbZn zrfkpotx+cKgpR7A6XBr7pXq+0Ztv+XNlltwItlb+uHHVDdoi6HxMEvODJ0e1v1FsyTm GvDx+qInuliMtOcr7eY+yRg+6UYTEMRc5S972NjRfMAUsPDaJ99KjApHSMN+l8sc9xAR vQIR/lACtcr5qfLjpmu3TIHccDxbC49QCE4vtU1OrlXNsYZkgZ7o+NvLlbtD0J92/nP0 Odnw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lGtJgY81; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 9si506569oiq.104.2020.02.21.00.25.01; Fri, 21 Feb 2020 00:25:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lGtJgY81; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388638AbgBUIYT (ORCPT + 99 others); Fri, 21 Feb 2020 03:24:19 -0500 Received: from mail.kernel.org ([198.145.29.99]:36706 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729774AbgBUIYS (ORCPT ); Fri, 21 Feb 2020 03:24:18 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A98AB2467D; Fri, 21 Feb 2020 08:24:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582273458; bh=zgVsgEnnXQ7LrYe7AE7KvemzilGGhK+OX2oKdOz0gEs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lGtJgY81QUfIxQPK2kBZCdxyvnoCKRQXf1zweD4boL0F49e8qYgj9O0md5mHBapaB r4SnSjdj36vJ69OT0Sd4M/KVDQrsmqLCNmLh8v4HnmKixuOxPsitBiIck8WvqQSqkN cj1rNgWnUKyHS9qEWNmtBIRtvSFOUu3uytG/DzpQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, kbuild test robot , Coly Li , Jens Axboe , Sasha Levin Subject: [PATCH 4.19 179/191] bcache: explicity type cast in bset_bkey_last() Date: Fri, 21 Feb 2020 08:42:32 +0100 Message-Id: <20200221072312.346674010@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200221072250.732482588@linuxfoundation.org> References: <20200221072250.732482588@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Coly Li [ Upstream commit 7c02b0055f774ed9afb6e1c7724f33bf148ffdc0 ] In bset.h, macro bset_bkey_last() is defined as, bkey_idx((struct bkey *) (i)->d, (i)->keys) Parameter i can be variable type of data structure, the macro always works once the type of struct i has member 'd' and 'keys'. bset_bkey_last() is also used in macro csum_set() to calculate the checksum of a on-disk data structure. When csum_set() is used to calculate checksum of on-disk bcache super block, the parameter 'i' data type is struct cache_sb_disk. Inside struct cache_sb_disk (also in struct cache_sb) the member keys is __u16 type. But bkey_idx() expects unsigned int (a 32bit width), so there is problem when sending parameters via stack to call bkey_idx(). Sparse tool from Intel 0day kbuild system reports this incompatible problem. bkey_idx() is part of user space API, so the simplest fix is to cast the (i)->keys to unsigned int type in macro bset_bkey_last(). Reported-by: kbuild test robot Signed-off-by: Coly Li Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin --- drivers/md/bcache/bset.h | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/md/bcache/bset.h b/drivers/md/bcache/bset.h index c71365e7c1fac..a50dcfda656f5 100644 --- a/drivers/md/bcache/bset.h +++ b/drivers/md/bcache/bset.h @@ -397,7 +397,8 @@ void bch_btree_keys_stats(struct btree_keys *b, struct bset_stats *state); /* Bkey utility code */ -#define bset_bkey_last(i) bkey_idx((struct bkey *) (i)->d, (i)->keys) +#define bset_bkey_last(i) bkey_idx((struct bkey *) (i)->d, \ + (unsigned int)(i)->keys) static inline struct bkey *bset_bkey_idx(struct bset *i, unsigned int idx) { -- 2.20.1