lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 10 Jan 2024 15:06:52 +0800
From: kernel test robot <lkp@...el.com>
To: Kent Overstreet <kent.overstreet@...ux.dev>
Cc: oe-kbuild-all@...ts.linux.dev, linux-kernel@...r.kernel.org
Subject: fs/bcachefs/sb-members.c:422:30: sparse: sparse: incorrect type in
 assignment (different base types)

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head:   ab27740f76654ed58dd32ac0ba0031c18a6dea3b
commit: 94119eeb02d114aa1f78dcfaabdca50b9b626790 bcachefs: Add IO error counts to bch_member
date:   10 weeks ago
config: i386-randconfig-061-20240106 (https://download.01.org/0day-ci/archive/20240110/202401101519.MjA7RH59-lkp@intel.com/config)
compiler: gcc-7 (Ubuntu 7.5.0-6ubuntu2) 7.5.0
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240110/202401101519.MjA7RH59-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202401101519.MjA7RH59-lkp@intel.com/

sparse warnings: (new ones prefixed by >>)
   fs/bcachefs/sb-members.c: note: in included file:
   fs/bcachefs/bcachefs.h:958:9: sparse: sparse: array of flexible structures
>> fs/bcachefs/sb-members.c:422:30: sparse: sparse: incorrect type in assignment (different base types) @@     expected restricted __le64 [usertype] errors_reset_time @@     got signed long long @@
   fs/bcachefs/sb-members.c:422:30: sparse:     expected restricted __le64 [usertype] errors_reset_time
   fs/bcachefs/sb-members.c:422:30: sparse:     got signed long long

vim +422 fs/bcachefs/sb-members.c

   412	
   413	void bch2_dev_errors_reset(struct bch_dev *ca)
   414	{
   415		struct bch_fs *c = ca->fs;
   416		struct bch_member *m;
   417	
   418		mutex_lock(&c->sb_lock);
   419		m = bch2_members_v2_get_mut(c->disk_sb.sb, ca->dev_idx);
   420		for (unsigned i = 0; i < ARRAY_SIZE(m->errors_at_reset); i++)
   421			m->errors_at_reset[i] = cpu_to_le64(atomic64_read(&ca->errors[i]));
 > 422		m->errors_reset_time = ktime_get_real_seconds();

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ