Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1020164yba; Thu, 4 Apr 2019 02:34:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqy9xfje2ome6/3h2s7J5rIvk+Agy+IoGmx06Ik0LhyfuvSCACivFpr8A39VdYfv/z0csUQI X-Received: by 2002:aa7:8615:: with SMTP id p21mr4862572pfn.98.1554370494653; Thu, 04 Apr 2019 02:34:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554370494; cv=none; d=google.com; s=arc-20160816; b=aI/Q2VZ8YzbHqC56piEMbcbF0uZHa1hilrktDZcKgi17EqWP5Z0aMjRoFFpF1JIWYq ayAFUTtWtohWQHtbeiwuEMXpYD9rv6oM5PRaDOsBcFQiq3jibKRcNUgUO5Qykcmh+jN5 5Qxd2+ehMK6X/2blSvHzIQR2FweZW647Odkdw8tFp/aJ3ndkmQYqm/E7jEJWJKw1Vk4e J2Gg48Xi2g12PL0pNx6WCLEUVjwRGdoYwWaWVEJYVPVgEk7CtSTjropBjTiY5NaK6kHP dPUzAavrduWa6nHJIlANFcj0PD8UL2wAK88PqaG3HOxd1vFHxY3RUQhcTWryTgpHo9DN Aj6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NJ462BaS6rBaUdHBtV/l+hBEaU4+y210DLp8P72ozT0=; b=Y2KTAzgwHyeSl+CZ0o4m+ieVVYXDfq7uvCWmJtphXaf9ycRJ8gb8HF7pznfgM85oQf DFqVLVrp+7jUC7WGBDFUDoz8woYWmnk5cosy8BKKvMWtTJlZBWGUXB+T1MWkPk+AmY1D wgFczrYinXLXo9Nn9l3dH0Xj3ENzXuQ7/lekSX+vfCHJPVStnDi4lbW5Ypw4v1AHP06k Tz9eAaPkbq5ksVqWKLgt19xo8vBcRG9xBRMsamchz/NimfZrHB86CzPNIm3BYdT/MHP4 x2lXwrBTx0tm82d9/EF/vrZs9v+QQIUeV+3TKPea0J+lOih/GdvAz4jFpRRDgFcyya7P gHug== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ltAl4gVW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k126si15790991pgk.109.2019.04.04.02.34.39; Thu, 04 Apr 2019 02:34:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ltAl4gVW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732937AbfDDJcS (ORCPT + 99 others); Thu, 4 Apr 2019 05:32:18 -0400 Received: from mail.kernel.org ([198.145.29.99]:48004 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732731AbfDDJIz (ORCPT ); Thu, 4 Apr 2019 05:08:55 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2755F214AF; Thu, 4 Apr 2019 09:08:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554368933; bh=Myw+nR3JZT7T+vHv1zwHX5ooJwXxQ5KCx4RbtVG0U0s=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ltAl4gVWV35WnqlLykH0J2OJ73M/aptQlVaUvUBAEhwcS3XW1vzmDv4oA4hb1jS74 vWLZekhZhPnhDfMG4HSq5Aw7szid81b7Miz1d2rd9Akp2DBq1m4vzao++rA6a2Rxyq WdwhZpMF+llydXUtYt/vX+xBYM/j8CWRq5QHtDl4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Arnd Bergmann , Nathan Chancellor , "David S. Miller" , Sasha Levin Subject: [PATCH 5.0 019/246] enic: fix build warning without CONFIG_CPUMASK_OFFSTACK Date: Thu, 4 Apr 2019 10:45:19 +0200 Message-Id: <20190404084619.832300183@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190404084619.236418459@linuxfoundation.org> References: <20190404084619.236418459@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 5.0-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 43d281662fdb46750d49417559b71069f435298d ] The enic driver relies on the CONFIG_CPUMASK_OFFSTACK feature to dynamically allocate a struct member, but this is normally intended for local variables. Building with clang, I get a warning for a few locations that check the address of the cpumask_var_t: drivers/net/ethernet/cisco/enic/enic_main.c:122:22: error: address of array 'enic->msix[i].affinity_mask' will always evaluate to 'true' [-Werror,-Wpointer-bool-conversion] As far as I can tell, the code is still correct, as the truth value of the pointer is what we need in this configuration. To get rid of the warning, use cpumask_available() instead of checking the pointer directly. Fixes: 322cf7e3a4e8 ("enic: assign affinity hint to interrupts") Signed-off-by: Arnd Bergmann Reviewed-by: Nathan Chancellor Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/cisco/enic/enic_main.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/drivers/net/ethernet/cisco/enic/enic_main.c b/drivers/net/ethernet/cisco/enic/enic_main.c index 9a7f70db20c7..733d9172425b 100644 --- a/drivers/net/ethernet/cisco/enic/enic_main.c +++ b/drivers/net/ethernet/cisco/enic/enic_main.c @@ -119,7 +119,7 @@ static void enic_init_affinity_hint(struct enic *enic) for (i = 0; i < enic->intr_count; i++) { if (enic_is_err_intr(enic, i) || enic_is_notify_intr(enic, i) || - (enic->msix[i].affinity_mask && + (cpumask_available(enic->msix[i].affinity_mask) && !cpumask_empty(enic->msix[i].affinity_mask))) continue; if (zalloc_cpumask_var(&enic->msix[i].affinity_mask, @@ -148,7 +148,7 @@ static void enic_set_affinity_hint(struct enic *enic) for (i = 0; i < enic->intr_count; i++) { if (enic_is_err_intr(enic, i) || enic_is_notify_intr(enic, i) || - !enic->msix[i].affinity_mask || + !cpumask_available(enic->msix[i].affinity_mask) || cpumask_empty(enic->msix[i].affinity_mask)) continue; err = irq_set_affinity_hint(enic->msix_entry[i].vector, @@ -161,7 +161,7 @@ static void enic_set_affinity_hint(struct enic *enic) for (i = 0; i < enic->wq_count; i++) { int wq_intr = enic_msix_wq_intr(enic, i); - if (enic->msix[wq_intr].affinity_mask && + if (cpumask_available(enic->msix[wq_intr].affinity_mask) && !cpumask_empty(enic->msix[wq_intr].affinity_mask)) netif_set_xps_queue(enic->netdev, enic->msix[wq_intr].affinity_mask, -- 2.19.1