mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-11-17 23:25:46 +08:00
UBIFS: fix sparse warnings
fs/ubifs/compress.c:111:8: warning: incorrect type in argument 5 (different signedness) fs/ubifs/compress.c:111:8: expected unsigned int *dlen fs/ubifs/compress.c:111:8: got int *out_len fs/ubifs/compress.c:175:10: warning: incorrect type in argument 5 (different signedness) fs/ubifs/compress.c:175:10: expected unsigned int *dlen fs/ubifs/compress.c:175:10: got int *out_len Fix this by adding a cast to (unsigned int *). We guarantee that our lengths are small and no overflow is possible. Signed-off-by: Artem Bityutskiy <Artem.Bityutskiy@nokia.com>
This commit is contained in:
parent
2acf806758
commit
6a4a9b438f
@ -108,7 +108,7 @@ void ubifs_compress(const void *in_buf, int in_len, void *out_buf, int *out_len,
|
||||
if (compr->comp_mutex)
|
||||
mutex_lock(compr->comp_mutex);
|
||||
err = crypto_comp_compress(compr->cc, in_buf, in_len, out_buf,
|
||||
out_len);
|
||||
(unsigned int *)out_len);
|
||||
if (compr->comp_mutex)
|
||||
mutex_unlock(compr->comp_mutex);
|
||||
if (unlikely(err)) {
|
||||
@ -172,7 +172,7 @@ int ubifs_decompress(const void *in_buf, int in_len, void *out_buf,
|
||||
if (compr->decomp_mutex)
|
||||
mutex_lock(compr->decomp_mutex);
|
||||
err = crypto_comp_decompress(compr->cc, in_buf, in_len, out_buf,
|
||||
out_len);
|
||||
(unsigned int *)out_len);
|
||||
if (compr->decomp_mutex)
|
||||
mutex_unlock(compr->decomp_mutex);
|
||||
if (err)
|
||||
|
Loading…
Reference in New Issue
Block a user