Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp949583ybi; Fri, 12 Jul 2019 07:13:15 -0700 (PDT) X-Google-Smtp-Source: APXvYqxyUiPGYkeN9EwNSPOB533+3ecfb7lepSW/ROtTSS4JDljUFFGoTUj0vXwUcJ0tjhAcM007 X-Received: by 2002:a17:902:30a3:: with SMTP id v32mr2731170plb.163.1562940795575; Fri, 12 Jul 2019 07:13:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562940795; cv=none; d=google.com; s=arc-20160816; b=cypRvJPjTfoqYJR/1D/dENLFsP6gfFiQ8yL7Vy7e/nCR4RdkQ67rEhWlKom+JEnfQd fdaJebWxHGeqFlT3qloNu+VjXm8dWNoibgBMNVHsDJ2JvS8N8IRvqeIv07mCxc2CQBiN pZIX6bsg1nTFTPrM8mV54jn2yc3wZW3DJiHpj/tIgDNktSirGT8/4BYy+oexYiphZGhn EPAMegtxITB4TigNZj9LahQ61irwuco/O05sNdIvIJs7Eh1G0eCJXFueSq/wOP0oSOsT QHBcYCW8nAf9xyoeWIcG7zGDNDBO8EsiscYfMpwLqEfsFN+VrUdNH0LvHtV9eQei4Gl/ wMtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=JO9RZkfoK5m6hpzkp7Qh2TBxvrqYsBhS++3w2Jx1MZI=; b=0w0TYvvglCNT4cjQix2yzCJSuiapPTrSXU1p6mwVlBuhn1Pip7an9s6CGEol0aRwiE URfAt1tQLovQu/Unzx1qznDHr/hmGMjjzxcjB+C2NfHwXCMjx8LN8PnLZJNb03rylF20 rRcu+TPCPTIL6eKsZVfhfUaodnXcsAot3NKYm8EWGaj3xFQYRvbiffVDfqvMvK9ajKmD zp0sRGVfAaO2PciT+OpER7GXQB/0XdSJYHnBziTK72fzx6EiQNaRMrK5xXQ1jcssDUZW 6CGUviDq8gJeBEag4gUJygGiBGpZuQWDb9NBxB9JZjZmcUZBhOE3EpbAEYoIxPMJu9Nz gxqw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u70si8093699pgd.1.2019.07.12.07.12.59; Fri, 12 Jul 2019 07:13:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727280AbfGLOLB (ORCPT + 99 others); Fri, 12 Jul 2019 10:11:01 -0400 Received: from mx1.redhat.com ([209.132.183.28]:52874 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727236AbfGLOLA (ORCPT ); Fri, 12 Jul 2019 10:11:00 -0400 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 0979930821C2; Fri, 12 Jul 2019 14:11:00 +0000 (UTC) Received: from redhat.com (ovpn-116-209.ams2.redhat.com [10.36.116.209]) by smtp.corp.redhat.com (Postfix) with SMTP id 7C6D31001B11; Fri, 12 Jul 2019 14:10:52 +0000 (UTC) Date: Fri, 12 Jul 2019 10:10:51 -0400 From: "Michael S. Tsirkin" To: Pankaj Gupta Cc: dan.j.williams@intel.com, lcapitulino@redhat.com, virtualization@lists.linux-foundation.org, linux-nvdimm@lists.01.org, cohuck@redhat.com, yuval.shaia@oracle.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH v3] virtio_pmem: fix sparse warning Message-ID: <20190712101021-mutt-send-email-mst@kernel.org> References: <20190712051610.15478-1-pagupta@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190712051610.15478-1-pagupta@redhat.com> X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.47]); Fri, 12 Jul 2019 14:11:00 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 12, 2019 at 10:46:10AM +0530, Pankaj Gupta wrote: > This patch fixes below sparse warning related to __virtio > type in virtio pmem driver. This is reported by Intel test > bot on linux-next tree. > > nd_virtio.c:56:28: warning: incorrect type in assignment > (different base types) > nd_virtio.c:56:28: expected unsigned int [unsigned] [usertype] type > nd_virtio.c:56:28: got restricted __virtio32 > nd_virtio.c:93:59: warning: incorrect type in argument 2 > (different base types) > nd_virtio.c:93:59: expected restricted __virtio32 [usertype] val > nd_virtio.c:93:59: got unsigned int [unsigned] [usertype] ret > > Reported-by: kbuild test robot > Signed-off-by: Pankaj Gupta Acked-by: Michael S. Tsirkin Pls merge - I assume nvdimm tree? > --- > This fixes a warning, so submitting it as a separate > patch on top of virtio pmem series. > > v2-> v3 > Use __le for req/resp fields - Michael > > drivers/nvdimm/nd_virtio.c | 4 ++-- > include/uapi/linux/virtio_pmem.h | 4 ++-- > 2 files changed, 4 insertions(+), 4 deletions(-) > > diff --git a/drivers/nvdimm/nd_virtio.c b/drivers/nvdimm/nd_virtio.c > index 8645275c08c2..10351d5b49fa 100644 > --- a/drivers/nvdimm/nd_virtio.c > +++ b/drivers/nvdimm/nd_virtio.c > @@ -53,7 +53,7 @@ static int virtio_pmem_flush(struct nd_region *nd_region) > init_waitqueue_head(&req_data->host_acked); > init_waitqueue_head(&req_data->wq_buf); > INIT_LIST_HEAD(&req_data->list); > - req_data->req.type = cpu_to_virtio32(vdev, VIRTIO_PMEM_REQ_TYPE_FLUSH); > + req_data->req.type = cpu_to_le32(VIRTIO_PMEM_REQ_TYPE_FLUSH); > sg_init_one(&sg, &req_data->req, sizeof(req_data->req)); > sgs[0] = &sg; > sg_init_one(&ret, &req_data->resp.ret, sizeof(req_data->resp)); > @@ -90,7 +90,7 @@ static int virtio_pmem_flush(struct nd_region *nd_region) > } else { > /* A host repsonse results in "host_ack" getting called */ > wait_event(req_data->host_acked, req_data->done); > - err = virtio32_to_cpu(vdev, req_data->resp.ret); > + err = le32_to_cpu(req_data->resp.ret); > } > > kfree(req_data); > diff --git a/include/uapi/linux/virtio_pmem.h b/include/uapi/linux/virtio_pmem.h > index efcd72f2d20d..9a63ed6d062f 100644 > --- a/include/uapi/linux/virtio_pmem.h > +++ b/include/uapi/linux/virtio_pmem.h > @@ -23,12 +23,12 @@ struct virtio_pmem_config { > > struct virtio_pmem_resp { > /* Host return status corresponding to flush request */ > - __u32 ret; > + __le32 ret; > }; > > struct virtio_pmem_req { > /* command type */ > - __u32 type; > + __le32 type; > }; > > #endif > -- > 2.14.5