Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp914070pxb; Wed, 1 Sep 2021 12:34:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzIdbKG3E48evt1Y6XsQ2IXpDfJSEvUU6YYMpMn0wwkiRtxYLySvG5Sbq+tYcCLblXmsSw1 X-Received: by 2002:a02:b605:: with SMTP id h5mr1042922jam.119.1630524840423; Wed, 01 Sep 2021 12:34:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630524840; cv=none; d=google.com; s=arc-20160816; b=LjNuF8vnGKkOly7x9TwVjsA8KCvxJ5t82lkHktzzIPHGMZWaf1XqoBMdkUdrQn3+M5 2JnECePYXk3eGvstfA18LoeeGH+1UNbxSgJKh54ILje2esxy/VsBm4bmd6OEe3KojHdN J7748hzHsiJqEvUq5l8oij/dC2QB3u08qg+X8IGCZUj2lCbs/zSfQNKwsbbjZG9fFY9Q cnGEzRtHsLSeIoOs2gGTleKmZA5sq+wVqJVyfLzStXLl7fliKQYpCE3NG5UC/xhOVNzs M5Rg6gR3+d7RU/4jIYTB6rmC0X5w02q0/vt3KoLsyL7uq75J3aiuXikNAFS57l1tO6yo kPPg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=8JkHzl3Lxnt+Fsb4onqX5mYhBbL+3BSvpDv+oA1NF68=; b=mJAJPJPO4KFJG4VP2DxP9nxjltGkcj91fwmFUgTymVVMu2Q2ZJInVBp18v0qtEl4Lt Cuaqljp/Q2KUbn8UEfQKsNpPuHL/aG5RKJXLFRx0u1nssYfsjwBjzahS1suJM0PfkD/m T/DhytvcaKShpBg9i+TL3kyD81Lr48DKunlZrm/964X/7ApJlLK9NNaQcVxirFMYRBIT 3WiWf+1TfRUMW9OdPA7iJW+yuvfYfnJgoLXbe0rm9eEQrVf+yYlqv7IWE3mCPc2CgHOC j7QmwAiuHlGvDsMPgVXMrYQv7skND1h56er4A5NsNtVxaTUCTt4X9LPPRpFUhbUQSo7z r1Iw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="ip4m8D/f"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v5si500907ilg.86.2021.09.01.12.33.47; Wed, 01 Sep 2021 12:34:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="ip4m8D/f"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343562AbhIAMgC (ORCPT + 99 others); Wed, 1 Sep 2021 08:36:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:35682 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S245077AbhIAMeA (ORCPT ); Wed, 1 Sep 2021 08:34:00 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C519761101; Wed, 1 Sep 2021 12:32:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1630499542; bh=pDiIeXIMJJQSlQ9idD3XsFcHNUg17TiXQAif29lmiWw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ip4m8D/fEix5J+iJxqPjiaWD/WfxC1u5k75X8SSv6mVLgE8heK4wDLK43sbcRY4xo Htoxq/3WtXzcg/9uz56nrBD8bxDDm91w2qDOVcxClSEviBwmgDA4fwCm3RckDs396A Nz25T1zJni9UzBjgX7X3g5EQB28sykVb8oCtK6/k= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, kbuild test robot , Andrii Nakryiko , Daniel Borkmann , Martin KaFai Lau , Rafael David Tinoco Subject: [PATCH 5.4 40/48] bpf: Fix cast to pointer from integer of different size warning Date: Wed, 1 Sep 2021 14:28:30 +0200 Message-Id: <20210901122254.711952358@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210901122253.388326997@linuxfoundation.org> References: <20210901122253.388326997@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andrii Nakryiko commit 2dedd7d2165565bafa89718eaadfc5d1a7865f66 upstream. Fix "warning: cast to pointer from integer of different size" when casting u64 addr to void *. Fixes: a23740ec43ba ("bpf: Track contents of read-only maps as scalars") Reported-by: kbuild test robot Signed-off-by: Andrii Nakryiko Signed-off-by: Daniel Borkmann Acked-by: Martin KaFai Lau Link: https://lore.kernel.org/bpf/20191011172053.2980619-1-andriin@fb.com Cc: Rafael David Tinoco Signed-off-by: Greg Kroah-Hartman --- kernel/bpf/verifier.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -2792,7 +2792,7 @@ static int bpf_map_direct_read(struct bp err = map->ops->map_direct_value_addr(map, &addr, off); if (err) return err; - ptr = (void *)addr + off; + ptr = (void *)(long)addr + off; switch (size) { case sizeof(u8):