From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 86C4C1C688; Wed, 17 Jan 2024 10:55:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=192.198.163.8 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705488904; cv=none; b=D/aDyLQU3aIS/nRDk97ZproYS0dZNyNvznRLNPcOV2oLs6zr1YEhSaUUJGRS+aVJ0KoFTdHF/8r8YbCWYYpl2p/uSTmSJPZksjm6l9jAhsv11UiFHrRDXyRV58+JUC6T2Xe0mhAt9jNvRR4AXVp2myzr6WpzVdqLS7tRgynXkao= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705488904; c=relaxed/simple; bh=IjikLbskxHLd+oZaSmVNiN1Imvk5SrcRdLYyc+5MJXc=; h=DKIM-Signature:X-IronPort-AV:X-IronPort-AV:Received:X-ExtLoop1: X-IronPort-AV:X-IronPort-AV:Received:Received:Date:From:To:Cc: Subject:Message-ID:MIME-Version:Content-Type:Content-Disposition; b=FQJvsILE6APMu3c8P356Y1xW0I819ti4JwlL30S4kNWJzMEOOExkI8+nYOW/Jdw9GVSy9tIa7WBXzgFEqj5NGWi93mzfNaKc93TjMejkbAob89aPfUkAv/zGhHlxnH4aq3NaQiwhmZXZw51ST9AgfjzvW8BrnzOMu6WNgtqn3QE= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com; spf=pass smtp.mailfrom=intel.com; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b=C+i15ufK; arc=none smtp.client-ip=192.198.163.8 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="C+i15ufK" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1705488903; x=1737024903; h=date:from:to:cc:subject:message-id:mime-version; bh=IjikLbskxHLd+oZaSmVNiN1Imvk5SrcRdLYyc+5MJXc=; b=C+i15ufKwBhLuLFMrOkFOLks6X7jnhwetTjbZBZl09U7hlQ1gBx9tlfr I0kR5pcP4GGz5/Z3jMb1q/oVclmi+CjId+E27fAZpmKIh33ETiqncFG0O tipSNneFnuoJZBybL3Ng0HuiRDErPgoNbintmRw/qiWDvzed75u8OIT6z xUECs3BFIJdc9szJAMdYqED54+NV4W6Rw+raJMu2yw8vXM7jqNUkXhUAU 0xwFRAiSZEsEoEr0ZREG+FgaNha3EpNa2noQp6NtAQSMc4ezgtvv6yIjG w+FgtNY9GLZcZihnbGjgXOJfdnPrRpNRB3oeOwUCi3rnN9EyqBREL3f1V w==; X-IronPort-AV: E=McAfee;i="6600,9927,10955"; a="13639934" X-IronPort-AV: E=Sophos;i="6.05,200,1701158400"; d="scan'208";a="13639934" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmvoesa102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Jan 2024 02:55:02 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10955"; a="760540400" X-IronPort-AV: E=Sophos;i="6.05,200,1701158400"; d="scan'208";a="760540400" Received: from lkp-server01.sh.intel.com (HELO 961aaaa5b03c) ([10.239.97.150]) by orsmga006.jf.intel.com with ESMTP; 17 Jan 2024 02:54:59 -0800 Received: from kbuild by 961aaaa5b03c with local (Exim 4.96) (envelope-from ) id 1rQ3ZQ-0001u8-31; Wed, 17 Jan 2024 10:54:56 +0000 Date: Wed, 17 Jan 2024 18:54:06 +0800 From: kernel test robot To: David Howells Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev Subject: [dhowells-fs:ceph-iter 98/105] fs/ceph/crypto.c:608:28: error: incompatible pointer types passing 'u32 *' (aka 'unsigned int *') to parameter of type 'size_t *' (aka 'unsigned long *') Message-ID: <202401171830.v1grY7cK-lkp@intel.com> Precedence: bulk X-Mailing-List: llvm@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline tree: https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git ceph-iter head: 2cf82c6e7baf6d3a2adc0692707028da395f1553 commit: da0d419452928c43bddccbfdc3f5636a36ad05cd [98/105] ceph: Make ceph_calc_file_object_mapping() return size as size_t config: x86_64-rhel-8.3-rust (https://download.01.org/0day-ci/archive/20240117/202401171830.v1grY7cK-lkp@intel.com/config) compiler: ClangBuiltLinux clang version 17.0.6 (https://github.com/llvm/llvm-project 6009708b4367171ccdbf4b5905cb6a803753fe18) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240117/202401171830.v1grY7cK-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202401171830.v1grY7cK-lkp@intel.com/ All errors (new ones prefixed by >>): >> fs/ceph/crypto.c:608:28: error: incompatible pointer types passing 'u32 *' (aka 'unsigned int *') to parameter of type 'size_t *' (aka 'unsigned long *') [-Werror,-Wincompatible-pointer-types] 608 | &objno, &objoff, &xlen); | ^~~~~ include/linux/ceph/striper.h:12:41: note: passing argument to parameter 'xlen' here 12 | u64 *objno, u64 *objoff, size_t *xlen); | ^ 1 error generated. vim +608 fs/ceph/crypto.c 77cdb7e17e39eb Jeff Layton 2022-08-25 577 77cdb7e17e39eb Jeff Layton 2022-08-25 578 /** 77cdb7e17e39eb Jeff Layton 2022-08-25 579 * ceph_fscrypt_decrypt_extents: decrypt received extents in given buffer 77cdb7e17e39eb Jeff Layton 2022-08-25 580 * @inode: inode associated with pages being decrypted 77cdb7e17e39eb Jeff Layton 2022-08-25 581 * @page: pointer to page array 77cdb7e17e39eb Jeff Layton 2022-08-25 582 * @off: offset into the file that the data in page[0] starts 77cdb7e17e39eb Jeff Layton 2022-08-25 583 * @map: pointer to extent array 77cdb7e17e39eb Jeff Layton 2022-08-25 584 * @ext_cnt: length of extent array 77cdb7e17e39eb Jeff Layton 2022-08-25 585 * 77cdb7e17e39eb Jeff Layton 2022-08-25 586 * Given an extent map and a page array, decrypt the received data in-place, 77cdb7e17e39eb Jeff Layton 2022-08-25 587 * skipping holes. Returns the offset into buffer of end of last decrypted 77cdb7e17e39eb Jeff Layton 2022-08-25 588 * block. 77cdb7e17e39eb Jeff Layton 2022-08-25 589 */ 77cdb7e17e39eb Jeff Layton 2022-08-25 590 int ceph_fscrypt_decrypt_extents(struct inode *inode, struct page **page, 77cdb7e17e39eb Jeff Layton 2022-08-25 591 u64 off, struct ceph_sparse_extent *map, 77cdb7e17e39eb Jeff Layton 2022-08-25 592 u32 ext_cnt) 77cdb7e17e39eb Jeff Layton 2022-08-25 593 { 38d46409c4639a Xiubo Li 2023-06-12 594 struct ceph_client *cl = ceph_inode_to_client(inode); 77cdb7e17e39eb Jeff Layton 2022-08-25 595 int i, ret = 0; 77cdb7e17e39eb Jeff Layton 2022-08-25 596 struct ceph_inode_info *ci = ceph_inode(inode); 77cdb7e17e39eb Jeff Layton 2022-08-25 597 u64 objno, objoff; 77cdb7e17e39eb Jeff Layton 2022-08-25 598 u32 xlen; 77cdb7e17e39eb Jeff Layton 2022-08-25 599 77cdb7e17e39eb Jeff Layton 2022-08-25 600 /* Nothing to do for empty array */ 77cdb7e17e39eb Jeff Layton 2022-08-25 601 if (ext_cnt == 0) { 38d46409c4639a Xiubo Li 2023-06-12 602 doutc(cl, "%p %llx.%llx empty array, ret 0\n", inode, 38d46409c4639a Xiubo Li 2023-06-12 603 ceph_vinop(inode)); 77cdb7e17e39eb Jeff Layton 2022-08-25 604 return 0; 77cdb7e17e39eb Jeff Layton 2022-08-25 605 } 77cdb7e17e39eb Jeff Layton 2022-08-25 606 77cdb7e17e39eb Jeff Layton 2022-08-25 607 ceph_calc_file_object_mapping(&ci->i_layout, off, map[0].len, 77cdb7e17e39eb Jeff Layton 2022-08-25 @608 &objno, &objoff, &xlen); 77cdb7e17e39eb Jeff Layton 2022-08-25 609 77cdb7e17e39eb Jeff Layton 2022-08-25 610 for (i = 0; i < ext_cnt; ++i) { 77cdb7e17e39eb Jeff Layton 2022-08-25 611 struct ceph_sparse_extent *ext = &map[i]; 77cdb7e17e39eb Jeff Layton 2022-08-25 612 int pgsoff = ext->off - objoff; 77cdb7e17e39eb Jeff Layton 2022-08-25 613 int pgidx = pgsoff >> PAGE_SHIFT; 77cdb7e17e39eb Jeff Layton 2022-08-25 614 int fret; 77cdb7e17e39eb Jeff Layton 2022-08-25 615 77cdb7e17e39eb Jeff Layton 2022-08-25 616 if ((ext->off | ext->len) & ~CEPH_FSCRYPT_BLOCK_MASK) { 38d46409c4639a Xiubo Li 2023-06-12 617 pr_warn_client(cl, 38d46409c4639a Xiubo Li 2023-06-12 618 "%p %llx.%llx bad encrypted sparse extent " 38d46409c4639a Xiubo Li 2023-06-12 619 "idx %d off %llx len %llx\n", 38d46409c4639a Xiubo Li 2023-06-12 620 inode, ceph_vinop(inode), i, ext->off, 38d46409c4639a Xiubo Li 2023-06-12 621 ext->len); 77cdb7e17e39eb Jeff Layton 2022-08-25 622 return -EIO; 77cdb7e17e39eb Jeff Layton 2022-08-25 623 } 77cdb7e17e39eb Jeff Layton 2022-08-25 624 fret = ceph_fscrypt_decrypt_pages(inode, &page[pgidx], 77cdb7e17e39eb Jeff Layton 2022-08-25 625 off + pgsoff, ext->len); 38d46409c4639a Xiubo Li 2023-06-12 626 doutc(cl, "%p %llx.%llx [%d] 0x%llx~0x%llx fret %d\n", inode, 38d46409c4639a Xiubo Li 2023-06-12 627 ceph_vinop(inode), i, ext->off, ext->len, fret); 77cdb7e17e39eb Jeff Layton 2022-08-25 628 if (fret < 0) { 77cdb7e17e39eb Jeff Layton 2022-08-25 629 if (ret == 0) 77cdb7e17e39eb Jeff Layton 2022-08-25 630 ret = fret; 77cdb7e17e39eb Jeff Layton 2022-08-25 631 break; 77cdb7e17e39eb Jeff Layton 2022-08-25 632 } 77cdb7e17e39eb Jeff Layton 2022-08-25 633 ret = pgsoff + fret; 77cdb7e17e39eb Jeff Layton 2022-08-25 634 } 38d46409c4639a Xiubo Li 2023-06-12 635 doutc(cl, "ret %d\n", ret); 77cdb7e17e39eb Jeff Layton 2022-08-25 636 return ret; 77cdb7e17e39eb Jeff Layton 2022-08-25 637 } 77cdb7e17e39eb Jeff Layton 2022-08-25 638 :::::: The code at line 608 was first introduced by commit :::::: 77cdb7e17e39ebb986f60bbd3c2b3507687bf475 ceph: add infrastructure for file encryption and decryption :::::: TO: Jeff Layton :::::: CC: Ilya Dryomov -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki