Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp9507835ybi; Wed, 10 Jul 2019 11:31:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqwHToKkYC8bC1MpfEJeCwaIcNV/RNTX9UJR5WQOQMTmnz4N2kmv41l3S7YyiFNmBNtIARcg X-Received: by 2002:a63:505a:: with SMTP id q26mr22641206pgl.18.1562783487607; Wed, 10 Jul 2019 11:31:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562783487; cv=none; d=google.com; s=arc-20160816; b=Q6q8JjTTV2vdWl95MCOwfiBMEJzkEYZ739LJruj4qq641yMB9UIBl1w4Faqqpb+Dvl Tcs+jEe5IUEAQwvDQV7pp+B8gVplC3MJKdSPlsSbqEpoSN4JvthR+X7+IXaTTujIuNst ts9O5b93fsOJckG0TSb/YAxShVSslNUHVuXf1Ys3OnVgGQkxdopE2m3q3GQWfvH1Ot1h 6UyoTjmECEyZvqFNXVSzpdd6LJQDKJmnGN7ZwOOzekz1sqVh/TwVILcVrinJOxuwhgHT B5caeZS7RC6QpEJWck82lINMUzoUAnEznEzdlX7JVkajXIwQT72NaR/8t0jGDvHDcBxY 2jjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=DiQsiHvLGCGzeXYNjGL4NYquoZxq1zE4LwBEhkkXJCk=; b=Z1rgNGRB664ab2Te3drteMpUnBuzyndinmPetFyDNCQMN+HGVmdDG/+MWZrU+33F1P 5V3ZpTlDs9LA3nHseDDXGkztgShE3KM3+kQbbzBFrJquPvUD0elORa7mX17z0TXnEeXU /Kw9rPbyzcFD67hoF0dt4Fh7LyXDaa7SkQZz9HSiFps+htNXR+mG5cw7G2hC1kQqg6Vi Vi9yEAJPyjO7QzLqmM93hNeZX0KcK1bF5X2x/SzbhxImw/yi1XCczqxFpuhUdQesIk8X qqF+c2UldOaxY8g5rXMvsulW0lpmyLJGsWOwffHpXzDFk47UZWfKqCIU5YlbEx28hRw1 135g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c17si3065083pgi.81.2019.07.10.11.31.11; Wed, 10 Jul 2019 11:31:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728168AbfGJR7R (ORCPT + 99 others); Wed, 10 Jul 2019 13:59:17 -0400 Received: from mx1.redhat.com ([209.132.183.28]:43478 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727222AbfGJR7Q (ORCPT ); Wed, 10 Jul 2019 13:59:16 -0400 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 83E8330C1D17; Wed, 10 Jul 2019 17:59:16 +0000 (UTC) Received: from dhcp201-121.englab.pnq.redhat.com (ovpn-116-55.sin2.redhat.com [10.67.116.55]) by smtp.corp.redhat.com (Postfix) with ESMTP id CCDAA60148; Wed, 10 Jul 2019 17:59:03 +0000 (UTC) From: Pankaj Gupta To: virtualization@lists.linux-foundation.org, dan.j.williams@intel.com Cc: yuval.shaia@oracle.com, linux-nvdimm@lists.01.org, linux-kernel@vger.kernel.org, cohuck@redhat.com, mst@redhat.com, lcapitulino@redhat.com, pagupta@redhat.com Subject: [PATCH v2] virtio_pmem: fix sparse warning Date: Wed, 10 Jul 2019 23:28:32 +0530 Message-Id: <20190710175832.17252-1-pagupta@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.45]); Wed, 10 Jul 2019 17:59:16 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch fixes below sparse warning related to __virtio type in virtio pmem driver. This is reported by Intel test bot on linux-next tree. nd_virtio.c:56:28: warning: incorrect type in assignment (different base types) nd_virtio.c:56:28: expected unsigned int [unsigned] [usertype] type nd_virtio.c:56:28: got restricted __virtio32 nd_virtio.c:93:59: warning: incorrect type in argument 2 (different base types) nd_virtio.c:93:59: expected restricted __virtio32 [usertype] val nd_virtio.c:93:59: got unsigned int [unsigned] [usertype] ret Reported-by: kbuild test robot Signed-off-by: Pankaj Gupta --- This fixes a warning, so submitting it as a separate patch on top of virtio pmem series. include/uapi/linux/virtio_pmem.h | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/include/uapi/linux/virtio_pmem.h b/include/uapi/linux/virtio_pmem.h index efcd72f2d20d..7a7435281362 100644 --- a/include/uapi/linux/virtio_pmem.h +++ b/include/uapi/linux/virtio_pmem.h @@ -10,7 +10,7 @@ #ifndef _UAPI_LINUX_VIRTIO_PMEM_H #define _UAPI_LINUX_VIRTIO_PMEM_H -#include +#include #include #include @@ -23,12 +23,12 @@ struct virtio_pmem_config { struct virtio_pmem_resp { /* Host return status corresponding to flush request */ - __u32 ret; + __virtio32 ret; }; struct virtio_pmem_req { /* command type */ - __u32 type; + __virtio32 type; }; #endif -- 2.20.1