From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.9 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9D504C2BA1A for ; Tue, 7 Apr 2020 03:08:03 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 6508620801 for ; Tue, 7 Apr 2020 03:08:03 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="OkTOGKvC" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 6508620801 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=linux-foundation.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 106088E0050; Mon, 6 Apr 2020 23:08:03 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 091548E0001; Mon, 6 Apr 2020 23:08:03 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id E72FB8E0050; Mon, 6 Apr 2020 23:08:02 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0071.hostedemail.com [216.40.44.71]) by kanga.kvack.org (Postfix) with ESMTP id C3D438E0001 for ; Mon, 6 Apr 2020 23:08:02 -0400 (EDT) Received: from smtpin13.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id 8B4ED99BE for ; Tue, 7 Apr 2020 03:08:02 +0000 (UTC) X-FDA: 76679574804.13.cart61_80636bde66c29 X-HE-Tag: cart61_80636bde66c29 X-Filterd-Recvd-Size: 2528 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by imf07.hostedemail.com (Postfix) with ESMTP for ; Tue, 7 Apr 2020 03:08:02 +0000 (UTC) Received: from localhost.localdomain (c-73-231-172-41.hsd1.ca.comcast.net [73.231.172.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 54C36214DB; Tue, 7 Apr 2020 03:08:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1586228881; bh=J8fk0kSnnIukxlu8vhMfTg3CJzOMvyd6AjHZVcvt0Gw=; h=Date:From:To:Subject:In-Reply-To:From; b=OkTOGKvCkPeEcquoydIDHHnDisrgWF/9WmsUEKvluygGh1i3BZUBDPZzy/jq7khIb JtI8YuAI9u88DewjWSOXiJJ3To+CG6YLtENSL+nuWacj2LS0D2IB7A+4JT102/y6vc U0wQTg6B/QJNUqk8fRG6j6MF6X8bOAWNt7ivHxGE= Date: Mon, 06 Apr 2020 20:08:00 -0700 From: Andrew Morton To: akpm@linux-foundation.org, linux-mm@kvack.org, mm-commits@vger.kernel.org, palmerdabbelt@google.com, torvalds@linux-foundation.org Subject: [patch 075/166] mm: prevent a warning when casting void* -> enum Message-ID: <20200407030800.mhJqunPQQ%akpm@linux-foundation.org> In-Reply-To: <20200406200254.a69ebd9e08c4074e41ddebaf@linux-foundation.org> User-Agent: s-nail v14.8.16 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: From: Palmer Dabbelt Subject: mm: prevent a warning when casting void* -> enum I recently build the RISC-V port with LLVM trunk, which has introduced a new warning when casting from a pointer to an enum of a smaller size. This patch simply casts to a long in the middle to stop the warning. I'd be surprised this is the only one in the kernel, but it's the only one I saw. Link: http://lkml.kernel.org/r/20200227211741.83165-1-palmer@dabbelt.com Signed-off-by: Palmer Dabbelt Reviewed-by: Andrew Morton Signed-off-by: Andrew Morton --- mm/rmap.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/mm/rmap.c~mm-elide-a-warning-when-casting-void-enum +++ a/mm/rmap.c @@ -1372,7 +1372,7 @@ static bool try_to_unmap_one(struct page struct page *subpage; bool ret = true; struct mmu_notifier_range range; - enum ttu_flags flags = (enum ttu_flags)arg; + enum ttu_flags flags = (enum ttu_flags)(long)arg; /* munlock has nothing to gain from examining un-locked vmas */ if ((flags & TTU_MUNLOCK) && !(vma->vm_flags & VM_LOCKED)) _