Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp430614ybi; Thu, 11 Jul 2019 22:18:41 -0700 (PDT) X-Google-Smtp-Source: APXvYqxiFe5Dg7OCWIwXWUDwKtQ7f+LwikJ6hzVUUSxDzL0BwYaX8654pCScuH63mqCzdRwioeQD X-Received: by 2002:a63:6056:: with SMTP id u83mr5665391pgb.181.1562908720829; Thu, 11 Jul 2019 22:18:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562908720; cv=none; d=google.com; s=arc-20160816; b=NY7C3LRJfN0CIVGOTFPBZS4hX+PwihdFhKrH0bgyE6+elKOhkHxSfWTa1bbKhIoBNy mW82qtOUdwq1OEf19vJKi6Rmrh9jtjhEU8XwAySqtvXloXbR4cEDhiVJ70DzsU3mnUzL G6gSlleKEbJY3J9Nb55m6FJ6sk30HktbwBSF3tINsdlUie+8wObtNONVprAil/n8ZSh6 OYyljCX0Ql+kfQ5bnpebBuQbugsnEn6CmelObGBzCjGoLLM3fJUjjnKee/Pbp+16o6ic 49PkGUcGU+XxnGWrBJWEF1CByf0AqdYV4p5LN3YYaO44bViyPxALNNIpmUAk7Xtl4kHF DKbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=6yC6XXLZyEzeUu1XCbhglVguWYqSNW4tkh/ArAU7M7c=; b=QSwf6HQVG9yCzXwOwOERmcCD0rDwFUVw/26Z+dcSDzhdFpMhd/sBly7Vy/NhhzTvsp mXZX48qirAqXOZRfwN7YblN5VuCTL92I6zx1XlfSmgZTwKH2MsYh2VN2qDnf6N0pUQbl zMh1/SJNmPGUWZQl2EiCu7jm42I+yQ2rU/UzYFgf65K2kz/XmS+wJtEw+EuwoXvRIuKg KhRNk01ao6dBUw4r9eSq4oda98ctc3eHp4ZYvqelGZE14aTjWsV+KVJ/S7Mu2RNVkmo3 xh1QS4OWTgFEQFgSwezPpxh/QWVCTW602y+gvtRw1igWcs/uuYG1DYKKs4XfjwHIptoE vUCQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l9si6606458plb.317.2019.07.11.22.18.25; Thu, 11 Jul 2019 22:18:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726061AbfGLFQZ (ORCPT + 99 others); Fri, 12 Jul 2019 01:16:25 -0400 Received: from mx1.redhat.com ([209.132.183.28]:43322 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725866AbfGLFQY (ORCPT ); Fri, 12 Jul 2019 01:16:24 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 92CE2308792E; Fri, 12 Jul 2019 05:16:24 +0000 (UTC) Received: from dhcp201-121.englab.pnq.redhat.com (ovpn-116-115.sin2.redhat.com [10.67.116.115]) by smtp.corp.redhat.com (Postfix) with ESMTP id E3CC85DE6E; Fri, 12 Jul 2019 05:16:14 +0000 (UTC) From: Pankaj Gupta To: dan.j.williams@intel.com Cc: mst@redhat.com, lcapitulino@redhat.com, virtualization@lists.linux-foundation.org, linux-nvdimm@lists.01.org, cohuck@redhat.com, yuval.shaia@oracle.com, linux-kernel@vger.kernel.org, pagupta@redhat.com Subject: [PATCH v3] virtio_pmem: fix sparse warning Date: Fri, 12 Jul 2019 10:46:10 +0530 Message-Id: <20190712051610.15478-1-pagupta@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.45]); Fri, 12 Jul 2019 05:16:24 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch fixes below sparse warning related to __virtio type in virtio pmem driver. This is reported by Intel test bot on linux-next tree. nd_virtio.c:56:28: warning: incorrect type in assignment (different base types) nd_virtio.c:56:28: expected unsigned int [unsigned] [usertype] type nd_virtio.c:56:28: got restricted __virtio32 nd_virtio.c:93:59: warning: incorrect type in argument 2 (different base types) nd_virtio.c:93:59: expected restricted __virtio32 [usertype] val nd_virtio.c:93:59: got unsigned int [unsigned] [usertype] ret Reported-by: kbuild test robot Signed-off-by: Pankaj Gupta --- This fixes a warning, so submitting it as a separate patch on top of virtio pmem series. v2-> v3 Use __le for req/resp fields - Michael drivers/nvdimm/nd_virtio.c | 4 ++-- include/uapi/linux/virtio_pmem.h | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/drivers/nvdimm/nd_virtio.c b/drivers/nvdimm/nd_virtio.c index 8645275c08c2..10351d5b49fa 100644 --- a/drivers/nvdimm/nd_virtio.c +++ b/drivers/nvdimm/nd_virtio.c @@ -53,7 +53,7 @@ static int virtio_pmem_flush(struct nd_region *nd_region) init_waitqueue_head(&req_data->host_acked); init_waitqueue_head(&req_data->wq_buf); INIT_LIST_HEAD(&req_data->list); - req_data->req.type = cpu_to_virtio32(vdev, VIRTIO_PMEM_REQ_TYPE_FLUSH); + req_data->req.type = cpu_to_le32(VIRTIO_PMEM_REQ_TYPE_FLUSH); sg_init_one(&sg, &req_data->req, sizeof(req_data->req)); sgs[0] = &sg; sg_init_one(&ret, &req_data->resp.ret, sizeof(req_data->resp)); @@ -90,7 +90,7 @@ static int virtio_pmem_flush(struct nd_region *nd_region) } else { /* A host repsonse results in "host_ack" getting called */ wait_event(req_data->host_acked, req_data->done); - err = virtio32_to_cpu(vdev, req_data->resp.ret); + err = le32_to_cpu(req_data->resp.ret); } kfree(req_data); diff --git a/include/uapi/linux/virtio_pmem.h b/include/uapi/linux/virtio_pmem.h index efcd72f2d20d..9a63ed6d062f 100644 --- a/include/uapi/linux/virtio_pmem.h +++ b/include/uapi/linux/virtio_pmem.h @@ -23,12 +23,12 @@ struct virtio_pmem_config { struct virtio_pmem_resp { /* Host return status corresponding to flush request */ - __u32 ret; + __le32 ret; }; struct virtio_pmem_req { /* command type */ - __u32 type; + __le32 type; }; #endif -- 2.14.5