From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8149FC433EF for ; Fri, 14 Jan 2022 22:03:58 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id E12696B00A9; Fri, 14 Jan 2022 17:03:57 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id CFE206B00AB; Fri, 14 Jan 2022 17:03:57 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B9E2F6B00AC; Fri, 14 Jan 2022 17:03:57 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0052.hostedemail.com [216.40.44.52]) by kanga.kvack.org (Postfix) with ESMTP id 9CF106B00A9 for ; Fri, 14 Jan 2022 17:03:57 -0500 (EST) Received: from smtpin29.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id 69F26998B4 for ; Fri, 14 Jan 2022 22:03:57 +0000 (UTC) X-FDA: 79030270914.29.AEAC0EA Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf30.hostedemail.com (Postfix) with ESMTP id 139DE80009 for ; Fri, 14 Jan 2022 22:03:56 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 678CE61FE2; Fri, 14 Jan 2022 22:03:56 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8A900C36AE9; Fri, 14 Jan 2022 22:03:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1642197835; bh=ZNao/APMSnVraYf7V2i353zBOJ2zo6kziYgfy8pkItk=; h=Date:From:To:Subject:In-Reply-To:From; b=yhL8IHrnWE47GhxUbYUgzmEXKgX9CG7o+ckNKTCTakC6psqYzaXRFDI4obHPepTpg uAsaakpZh50lFvlr3vjb0jGDYhbt0NPKLru0fmmvI8Gc64a8xDYpUKULT5O38fiqMe HIH2kNAl8S1DJulKh2+2AGJcObw+/WcDizcvnJvw= Date: Fri, 14 Jan 2022 14:03:55 -0800 From: Andrew Morton To: akpm@linux-foundation.org, amit.kachhap@arm.com, Kevin.Brodsky@arm.com, linux-mm@kvack.org, mm-commits@vger.kernel.org, torvalds@linux-foundation.org, Vincenzo.Frascino@arm.com, viro@zeniv.linux.org.uk Subject: [patch 020/146] fs/ioctl: remove unnecessary __user annotation Message-ID: <20220114220355.BH05XczvO%akpm@linux-foundation.org> In-Reply-To: <20220114140222.6b14f0061194d3200000c52d@linux-foundation.org> User-Agent: s-nail v14.8.16 X-Rspamd-Queue-Id: 139DE80009 X-Stat-Signature: 4dyfzj7ojd9hywmxeo3d1drrhjd83qkc Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=linux-foundation.org header.s=korg header.b=yhL8IHrn; dmarc=none; spf=pass (imf30.hostedemail.com: domain of akpm@linux-foundation.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=akpm@linux-foundation.org X-Rspamd-Server: rspam02 X-HE-Tag: 1642197836-423905 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: From: Amit Daniel Kachhap Subject: fs/ioctl: remove unnecessary __user annotation __user annotations are used by the checker (e.g sparse) to mark user pointers. However here __user is applied to a struct directly, without a pointer being directly involved. Although the presence of __user does not cause sparse to emit a warning, __user should be removed for consistency with other uses of offsetof(). Note: No functional changes intended. Link: https://lkml.kernel.org/r/20211122101256.7875-1-amit.kachhap@arm.com Signed-off-by: Amit Daniel Kachhap Cc: Vincenzo Frascino Cc: Kevin Brodsky Cc: Al Viro Signed-off-by: Andrew Morton --- fs/ioctl.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/fs/ioctl.c~fs-ioctl-remove-unnecessary-__user-annotation +++ a/fs/ioctl.c @@ -430,7 +430,7 @@ static int ioctl_file_dedupe_range(struc goto out; } - size = offsetof(struct file_dedupe_range __user, info[count]); + size = offsetof(struct file_dedupe_range, info[count]); if (size > PAGE_SIZE) { ret = -ENOMEM; goto out; _