Received: by 2002:a05:7412:31a9:b0:e2:908c:2ebd with SMTP id et41csp4416052rdb; Fri, 15 Sep 2023 01:08:09 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEcjKHYh/55+lp/5WqxUxfWxbAo5frg82LfyrDrMh3h7txKrRrBKaDnw4YUF2NlewxQ2XzS X-Received: by 2002:a05:6a20:3955:b0:137:c971:6a0c with SMTP id r21-20020a056a20395500b00137c9716a0cmr1034509pzg.31.1694765289286; Fri, 15 Sep 2023 01:08:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1694765289; cv=none; d=google.com; s=arc-20160816; b=YiNmq/0zxQYgu0p8x8IXrhmcLc9RQklWAsv6Oj+Az/PUrJF2MDP9Oe+LbctIZz4gvd ncNf8Q5ufdTaouv/m6HS8+y4umHuz1/KIKOhJTYoRMEZ5KwaH6M3GkBln4Ul83EuReBQ TSbnYmiJcmi7oyL7Kk7qNybDi7zCOwFk1JO9vNhlTxpRAs/FTC5cy6+QB3Eq0FaJuvnG WHDK/xWH8DK5ENT4pLNw2kw5JJo1k7y8jCbv73TtWWKpAbVtNx92/u7e9ehsKlmBRrxo v19j+RcuuB0Ckf/4febc/TUWPxYwAHNBalH8FHyh8w9Ar5ToNk3JmN1gfiig29RciJzT rrWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=QowXTRSSOC8IB4ueS9Xc0NCSyyqp5xMMkI7wePQSkak=; fh=wDmW3MygM6z458EHrOQ+wgmpjHiSULaiIug1BUWvUok=; b=JjqFe3sgKq6u954Y8L0caqKMIA+P7fHnmluWq4YPrdKjSxV09kZWANuAnAD1ixLyWQ UzAr9eWXakhbHzZVVSU5cIdqVvovMlC2sWW237aEjrsLjNtC9z5DKeuf9RjbjF1zFdKk xsPY/HkYePkf+4qqNemY7V6PFfdLomsqCG/ps2RJ7FDjIkKVCoyNUivPOVRVHptHW32F 2wvIVkznoaP8dTGf5QNPXszlsxsLBAmjqmD939QcoVu5/JR7+sxD8iwIYaSN/Fr7no8H 8QsF4Ybu/s8jRtDSh4DehTLy3uwIASOj+dz/CNjUut24t9d1GNKJQCH5dIqqyPR+NYSS QhwQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=I7g0e7aQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id z1-20020a63c041000000b00565e424cbc7si835702pgi.109.2023.09.15.01.08.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Sep 2023 01:08:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=I7g0e7aQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id D6C3281F472F; Wed, 13 Sep 2023 14:46:40 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232555AbjIMVql (ORCPT + 99 others); Wed, 13 Sep 2023 17:46:41 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38652 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232667AbjIMVqf (ORCPT ); Wed, 13 Sep 2023 17:46:35 -0400 Received: from mail-il1-x132.google.com (mail-il1-x132.google.com [IPv6:2607:f8b0:4864:20::132]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DFB641996 for ; Wed, 13 Sep 2023 14:46:30 -0700 (PDT) Received: by mail-il1-x132.google.com with SMTP id e9e14a558f8ab-34df008b0e7so989295ab.1 for ; Wed, 13 Sep 2023 14:46:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1694641590; x=1695246390; darn=vger.kernel.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date:message-id:reply-to; bh=QowXTRSSOC8IB4ueS9Xc0NCSyyqp5xMMkI7wePQSkak=; b=I7g0e7aQ8TUPL+cBdyf68fqBnNwBC67NO0vKP5MRG20/M5u3zTlp1zm6KznJcLq+NK wv9tB5PNakaKiLkwhtaqogQRBYuPn8VHAjDdaiHeToB8JGDaOLCP7nuU8d+XwXNo78sn ZH2bqYf4GYJnuq3LyP11++q1Aq3AoleewMjQO83xXsWpMjz5SftIn6OME9PXHzHyOs+B avL4sSPmTh2PqApzP2szzjA9Cq64TMFbrhdUFOt3ObvLnA5o4/M90gzmZ2/YwWoPwJVe 5bF7UgfRpkM9vmy5rwSJgLD88aWe2UQXL82rBcrwL/UvBT1luwLVIXsSFKE9jkRu3y4l z6cQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1694641590; x=1695246390; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=QowXTRSSOC8IB4ueS9Xc0NCSyyqp5xMMkI7wePQSkak=; b=PgMFhxnh1pFLmRXFwjaxmz/GlHgBB51x5Am9vyfHxZI2he/KR1aYb85TEyrNjW2zbZ +oZyNtBhoS7Telysr5ADR22X49j/96DJY/krMf8eC5e7URuGWwicpp2EVClPM5OGW50r yJHcStczsDX8bpOjol4FPgeHoxwyDWZg7M9Xt5uHZgnLn4/MGrwnVyLjTrxt1Y9dtnIE qdrX19CQYB2LgTZ+WyxoXs5idcjacVxIj7O6LvUK14wMWHforzehTiFydy+anSdxshrO TmYVE3aUdL79nN5OOUzb/bdQHbIvbs61mO6U1wdx1M+mrtAYsiOmZqLfwfx6Nz+O2isH c2jg== X-Gm-Message-State: AOJu0YzWc9SLn7pU8YyEkio6KLOCBTLZalF4h8/fEzPEkUHJMJwdDdqV jy+s72sGrl+uDJgPn7TvXWpxaA== X-Received: by 2002:a05:6e02:1bee:b0:34f:1e9c:45d9 with SMTP id y14-20020a056e021bee00b0034f1e9c45d9mr4553258ilv.12.1694641590231; Wed, 13 Sep 2023 14:46:30 -0700 (PDT) Received: from google.com (26.103.132.34.bc.googleusercontent.com. [34.132.103.26]) by smtp.gmail.com with ESMTPSA id r5-20020a92c505000000b0034f37a27bb4sm44105ilg.72.2023.09.13.14.46.29 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Sep 2023 14:46:29 -0700 (PDT) Date: Wed, 13 Sep 2023 21:46:27 +0000 From: Justin Stitt To: Nathan Chancellor Cc: kent.overstreet@linux.dev, bfoster@redhat.com, linux-bcachefs@vger.kernel.org, linux-kernel@vger.kernel.org, llvm@lists.linux.dev, patches@lists.linux.dev Subject: Re: [PATCH 4/7] bcachefs: Fix -Wformat in bch2_bucket_gens_invalid() Message-ID: <20230913214627.ankymdgklzwob4ij@google.com> References: <20230912-bcachefs-warning-fixes-v1-0-a1cc83a38836@kernel.org> <20230912-bcachefs-warning-fixes-v1-4-a1cc83a38836@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230912-bcachefs-warning-fixes-v1-4-a1cc83a38836@kernel.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Wed, 13 Sep 2023 14:46:41 -0700 (PDT) X-Spam-Status: No, score=-8.4 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email On Tue, Sep 12, 2023 at 12:15:41PM -0700, Nathan Chancellor wrote: > When building bcachefs for 32-bit ARM, there is a compiler warning in > bch2_bucket_gens_invalid() due to use of an incorrect format specifier: > > fs/bcachefs/alloc_background.c:530:10: error: format specifies type 'unsigned long' but the argument has type 'size_t' (aka 'unsigned int') [-Werror,-Wformat] > 529 | prt_printf(err, "bad val size (%lu != %zu)", > | ~~~ > | %zu > 530 | bkey_val_bytes(k.k), sizeof(struct bch_bucket_gens)); > | ^~~~~~~~~~~~~~~~~~~ > fs/bcachefs/util.h:223:54: note: expanded from macro 'prt_printf' > 223 | #define prt_printf(_out, ...) bch2_prt_printf(_out, __VA_ARGS__) > | ^~~~~~~~~~~ > > On 64-bit architectures, size_t is 'unsigned long', so there is no > warning when using %lu but on 32-bit architectures, size_t is 'unsigned > int'. Use '%zu', the format specifier for 'size_t', to eliminate the > warning. > > Fixes: 4be0d766a7e9 ("bcachefs: bucket_gens btree") > Signed-off-by: Nathan Chancellor Reviewed-by: Justin Stitt > --- > fs/bcachefs/alloc_background.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/fs/bcachefs/alloc_background.c b/fs/bcachefs/alloc_background.c > index 67e73864823c..2b0d155d1ed5 100644 > --- a/fs/bcachefs/alloc_background.c > +++ b/fs/bcachefs/alloc_background.c > @@ -526,7 +526,7 @@ int bch2_bucket_gens_invalid(const struct bch_fs *c, struct bkey_s_c k, > struct printbuf *err) > { > if (bkey_val_bytes(k.k) != sizeof(struct bch_bucket_gens)) { > - prt_printf(err, "bad val size (%lu != %zu)", > + prt_printf(err, "bad val size (%zu != %zu)", > bkey_val_bytes(k.k), sizeof(struct bch_bucket_gens)); > return -BCH_ERR_invalid_bkey; > } > > -- > 2.42.0 >