lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 14 Jan 2015 01:16:06 +0100 From: David Sterba <dsterba@...e.cz> To: Arnd Bergmann <arnd@...db.de> Cc: Chris Mason <clm@...com>, Miao Xie <miaox@...fujitsu.com>, Josef Bacik <jbacik@...com>, David Sterba <dsterba@...e.cz>, linux-btrfs@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH] Btrfs: avoid build warning on 32-bit On Tue, Jan 13, 2015 at 03:09:03PM +0100, Arnd Bergmann wrote: > A recent change introduced a type cast from a private 64-bit > value to a pointer, which works fine on 64-bit architectures, > but not on 32-bit ones, where it produces a harmless compiler > warning: > > fs/btrfs/extent_io.c: In function 'btrfs_free_io_failure_record': > fs/btrfs/extent_io.c:2193:13: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast] > > This adds an intermediate cast to 'unsigned long', which tells > the compiler to ignore the type mismatch. > > Signed-off-by: Arnd Bergmann <arnd@...db.de> > Fixes: f612496bca664 ("Btrfs: cleanup the read failure record after write > or when the inode is freeing") Already reported, but not merged https://patchwork.kernel.org/patch/5541281/ -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists