diff options
author | Kent Overstreet <kent.overstreet@linux.dev> | 2023-03-06 02:34:42 -0500 |
---|---|---|
committer | Kent Overstreet <kent.overstreet@linux.dev> | 2023-03-13 11:34:53 -0400 |
commit | 33f2693f0959dbf7c17f1159e9fc40febbe4f4a8 (patch) | |
tree | f7181621bf4fee5db83e05cbbdd92a6a7cdc68d6 | |
parent | e3130732d49ac31e58f78a9c3a1950d5f6685876 (diff) |
bcachefs: Fix spurious FORTIFY_SOURCE warning
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
-rw-r--r-- | fs/bcachefs/reflink.c | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/fs/bcachefs/reflink.c b/fs/bcachefs/reflink.c index 87446f7bad4f..d2e6adc13fb1 100644 --- a/fs/bcachefs/reflink.c +++ b/fs/bcachefs/reflink.c @@ -233,7 +233,13 @@ static int bch2_make_extent_indirect(struct btree_trans *trans, orig->k.type = KEY_TYPE_reflink_p; r_p = bkey_i_to_reflink_p(orig); set_bkey_val_bytes(&r_p->k, sizeof(r_p->v)); + + /* FORTIFY_SOURCE is broken here, and doesn't provide unsafe_memset() */ +#if !defined(__NO_FORTIFY) && defined(__OPTIMIZE__) && defined(CONFIG_FORTIFY_SOURCE) + __underlying_memset(&r_p->v, 0, sizeof(r_p->v)); +#else memset(&r_p->v, 0, sizeof(r_p->v)); +#endif r_p->v.idx = cpu_to_le64(bkey_start_offset(&r_v->k)); |