Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp9271179ybi; Wed, 10 Jul 2019 07:30:38 -0700 (PDT) X-Google-Smtp-Source: APXvYqyYi6532+UISqw3FfYd25YOeR+GDa90CpH0WixEVOlH0CNYDCl+PlHFeKf2KOv7T0Jkaouh X-Received: by 2002:a17:902:124:: with SMTP id 33mr40146552plb.145.1562769038227; Wed, 10 Jul 2019 07:30:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562769038; cv=none; d=google.com; s=arc-20160816; b=aBJVPS3ImIlUEa4a8au67hikbx4cFoQCnCidzMsZqmJCTaRxV1lTx2i/eDPnq0kuHT mEjoWyBaL0dZRUNKPG1A4sqdF5Lc+pDW+5Uyg6nF3ZpuO0qVzCZ1TPZ5FPz170x8uvEU irEzb5Zy+NRK0cEcMPhgtlvfa6S4nLXwXQC0w2wpXZe2HMyMD51OT78GTOfoDLIrV3r7 G8nSvFau5vZpIIl3MwgoKPMNzKJZHSBR1jc9LR9QsS6nd5P/SIuyjiCVkXqYUG5abJyP TGYjhYGOIRBPgE/85i50jJTkzTq/siXHS2tjG/UmcDr/EgnihXd54rEOAX4mvW3xJKDO cYNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=AYD6x4PTbnfz4m6a+jrdjLUgKq54Z16yLCwpPmm4mzk=; b=BR0EvRJBQNGUum386NkfBjJmYxR8bNbH41RZIF22iDXQL/hrPWNAtxWyAkM6qyGtql 8lNtktgwuItZWEpudKXJB7Ne9SJfDy5UOV4hEYhDDlZXh/g+VdagK4nAiDxemojoztGe tWzk1teTaK0CwIpCos//W4qA4+gDFQdp9HBi7cnB72hYRTTLFFHvXLubP1KrWWjmxt/9 aPOjxnPKQySpJB1FgTfHFgRVm3HAGVy3cLgX9BZ1KpE1IjoR9Z1UrRsr9Ftf9AwDjXY+ YQeQhkWA/9yLkpgIP3Ma43qfoacPF51cZsm3MEzRHcZ3b87S5MhQ3iPIyjnptSEmIK+N NKZA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r6si2235870pls.145.2019.07.10.07.30.21; Wed, 10 Jul 2019 07:30:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727919AbfGJO1S (ORCPT + 99 others); Wed, 10 Jul 2019 10:27:18 -0400 Received: from mx1.redhat.com ([209.132.183.28]:57998 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727154AbfGJO1R (ORCPT ); Wed, 10 Jul 2019 10:27:17 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 868C9307CDFC; Wed, 10 Jul 2019 14:27:17 +0000 (UTC) Received: from dhcp201-121.englab.pnq.redhat.com (ovpn-116-55.sin2.redhat.com [10.67.116.55]) by smtp.corp.redhat.com (Postfix) with ESMTP id 6EA411711D; Wed, 10 Jul 2019 14:27:06 +0000 (UTC) From: Pankaj Gupta To: virtualization@lists.linux-foundation.org, dan.j.williams@intel.com Cc: yuval.shaia@oracle.com, linux-nvdimm@lists.01.org, linux-kernel@vger.kernel.org, cohuck@redhat.com, mst@redhat.com, lcapitulino@redhat.com, pagupta@redhat.com Subject: [PATCH] virtio_pmem: fix sparse warning Date: Wed, 10 Jul 2019 19:57:00 +0530 Message-Id: <20190710142700.10215-1-pagupta@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.49]); Wed, 10 Jul 2019 14:27:17 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch fixes below sparse warning related to __virtio type in virtio pmem driver. This is reported by Intel test bot on linux-next tree. nd_virtio.c:56:28: warning: incorrect type in assignment (different base types) nd_virtio.c:56:28: expected unsigned int [unsigned] [usertype] type nd_virtio.c:56:28: got restricted __virtio32 nd_virtio.c:93:59: warning: incorrect type in argument 2 (different base types) nd_virtio.c:93:59: expected restricted __virtio32 [usertype] val nd_virtio.c:93:59: got unsigned int [unsigned] [usertype] ret Signed-off-by: Pankaj Gupta Reported-by: kbuild test robot --- This fixes a warning, so submitting it as a separate patch on top of virtio pmem series. include/uapi/linux/virtio_pmem.h | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/include/uapi/linux/virtio_pmem.h b/include/uapi/linux/virtio_pmem.h index efcd72f2d20d..f89129bf1f84 100644 --- a/include/uapi/linux/virtio_pmem.h +++ b/include/uapi/linux/virtio_pmem.h @@ -23,12 +23,12 @@ struct virtio_pmem_config { struct virtio_pmem_resp { /* Host return status corresponding to flush request */ - __u32 ret; + __virtio32 ret; }; struct virtio_pmem_req { /* command type */ - __u32 type; + __virtio32 type; }; #endif -- 2.20.1