Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp991213yba; Thu, 4 Apr 2019 01:55:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqxSJeVSpveUbl5V4rUt3znutBAzs8ILgEWPPk5SbdrtvDIysFmoabQqrECZ4FJjF2xwZKIn X-Received: by 2002:a17:902:396a:: with SMTP id e39mr5134377plg.220.1554368133681; Thu, 04 Apr 2019 01:55:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554368133; cv=none; d=google.com; s=arc-20160816; b=pHHuKX3onr/uyZUk4DKnZ+1N7+qdhyc90ytG7deyvUjDSM8aMZeRP0M51JQFUoaNVV hvpZnzoTpV1O0UPmBy5Is/fSLFo5bcrdK1oWSBz+fHDsB9BM0jT43ExmkaXNknpFng53 3hCjcSIJ+LFa0p9ntUSgQOvxeRz3mER8VyDllFHTP3W5+2X2byKiRG+2wrMlUd97N5gt CSQEMx3gt3+4CsRO5UkKulLTT1/RcdIpsR8YbcOVcBAjCcBqJ+2BgX2zK3Hy34on5zcK GMJKp63bvJyyGzt//bZc6SBymdDvqDVw+lxti9CjsUNKYUBYWyjnz1bN2+p0Pun9lliK qrHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=6B0VZL/mNU0q31DRJLH+4CvYQs2DcAt6PCsTGjw+/3E=; b=FhM3lAiEQ0sbr4tF/KwHLAhBXvR76sFxdSLz+9oGSQWlvDQUb87xQ46czZ2U/50YXs FSfq1nUc/bYgl4YXS6ftyP3Re1kACywtpirW9Ch64iSxFPk43NO8/J9LVupZIyl6cbj0 UViQdDQ5UaaMeEql4hpiggewFsdOHTH2HvSb0UysvzYpIJM51GeUuAa/aEZ3Eb/HWQLD a0emjctmzzgnyqoVa38dbzN0YuI0ssHjNmThSzcR7LMOji6sXEuoOkGGp7XUbRl8YIA3 dLEK3GpOHjxmXUfzqKkXvPtCU3IkYUuzqQ7qurJ4QYeux0LAR2HkxAV4zgcnBqwhpctZ YJMg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GNst1Xtr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x4si15667366pll.344.2019.04.04.01.55.19; Thu, 04 Apr 2019 01:55:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=GNst1Xtr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729957AbfDDIyH (ORCPT + 99 others); Thu, 4 Apr 2019 04:54:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:56614 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729908AbfDDIyD (ORCPT ); Thu, 4 Apr 2019 04:54:03 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B2E3020652; Thu, 4 Apr 2019 08:54:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554368042; bh=05SdunXKnUk6b8Z8vQdioJhQ9NZt3LOfslNNBY2dBPg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GNst1Xtrbul+sngdeZ4xn5vxYe2MPv8MXxi2As37Nk+xGH7jLOKZjvolxxbK5G/Tb 5Dxy41agpdHCtSTBqachTy3dzQoLswmctGqJr46Hk65pQlrWM+DZ4+YlmCDfM0ItWy KjNOA8kcF4neEzD1jmnEFD2mU2x4O0fp21sjw5hw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Arnd Bergmann , Nathan Chancellor , "David S. Miller" , Sasha Levin Subject: [PATCH 4.14 016/121] enic: fix build warning without CONFIG_CPUMASK_OFFSTACK Date: Thu, 4 Apr 2019 10:46:44 +0200 Message-Id: <20190404084546.246591774@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190404084545.245659903@linuxfoundation.org> References: <20190404084545.245659903@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 43d281662fdb46750d49417559b71069f435298d ] The enic driver relies on the CONFIG_CPUMASK_OFFSTACK feature to dynamically allocate a struct member, but this is normally intended for local variables. Building with clang, I get a warning for a few locations that check the address of the cpumask_var_t: drivers/net/ethernet/cisco/enic/enic_main.c:122:22: error: address of array 'enic->msix[i].affinity_mask' will always evaluate to 'true' [-Werror,-Wpointer-bool-conversion] As far as I can tell, the code is still correct, as the truth value of the pointer is what we need in this configuration. To get rid of the warning, use cpumask_available() instead of checking the pointer directly. Fixes: 322cf7e3a4e8 ("enic: assign affinity hint to interrupts") Signed-off-by: Arnd Bergmann Reviewed-by: Nathan Chancellor Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/cisco/enic/enic_main.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/net/ethernet/cisco/enic/enic_main.c b/drivers/net/ethernet/cisco/enic/enic_main.c index ced348e15a63..19f374b180fc 100644 --- a/drivers/net/ethernet/cisco/enic/enic_main.c +++ b/drivers/net/ethernet/cisco/enic/enic_main.c @@ -119,7 +119,7 @@ static void enic_init_affinity_hint(struct enic *enic) for (i = 0; i < enic->intr_count; i++) { if (enic_is_err_intr(enic, i) || enic_is_notify_intr(enic, i) || - (enic->msix[i].affinity_mask && + (cpumask_available(enic->msix[i].affinity_mask) && !cpumask_empty(enic->msix[i].affinity_mask))) continue; if (zalloc_cpumask_var(&enic->msix[i].affinity_mask, @@ -148,7 +148,7 @@ static void enic_set_affinity_hint(struct enic *enic) for (i = 0; i < enic->intr_count; i++) { if (enic_is_err_intr(enic, i) || enic_is_notify_intr(enic, i) || - !enic->msix[i].affinity_mask || + !cpumask_available(enic->msix[i].affinity_mask) || cpumask_empty(enic->msix[i].affinity_mask)) continue; err = irq_set_affinity_hint(enic->msix_entry[i].vector, @@ -161,7 +161,7 @@ static void enic_set_affinity_hint(struct enic *enic) for (i = 0; i < enic->wq_count; i++) { int wq_intr = enic_msix_wq_intr(enic, i); - if (enic->msix[wq_intr].affinity_mask && + if (cpumask_available(enic->msix[wq_intr].affinity_mask) && !cpumask_empty(enic->msix[wq_intr].affinity_mask)) netif_set_xps_queue(enic->netdev, enic->msix[wq_intr].affinity_mask, -- 2.19.1