From patchwork Wed Jun 15 20:19:41 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 102198 Delivered-To: patch@linaro.org Received: by 10.140.106.246 with SMTP id e109csp36010qgf; Wed, 15 Jun 2016 13:18:33 -0700 (PDT) X-Received: by 10.36.65.97 with SMTP id x94mr19360137ita.16.1466021913387; Wed, 15 Jun 2016 13:18:33 -0700 (PDT) Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ap9si14147210pad.30.2016.06.15.13.18.33; Wed, 15 Jun 2016 13:18:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933208AbcFOUSa (ORCPT + 30 others); Wed, 15 Jun 2016 16:18:30 -0400 Received: from mout.kundenserver.de ([212.227.17.13]:56470 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932671AbcFOUSZ (ORCPT ); Wed, 15 Jun 2016 16:18:25 -0400 Received: from wuerfel.lan. ([78.42.132.4]) by mrelayeu.kundenserver.de (mreue101) with ESMTPA (Nemesis) id 0M8zYj-1b7TIA1NFt-00CRip; Wed, 15 Jun 2016 22:18:07 +0200 From: Arnd Bergmann To: Ryusuke Konishi Cc: Arnd Bergmann , Andrew Morton , linux-nilfs@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] nilfs: avoid warning about unused variables Date: Wed, 15 Jun 2016 22:19:41 +0200 Message-Id: <20160615201945.3348205-1-arnd@arndb.de> X-Mailer: git-send-email 2.9.0 X-Provags-ID: V03:K0:oZoZNS6TCCml4KED7wq17Fhm31Nc7mqVj13+ZIJWRWN3tJ0ZF+F tF1U+i4eS5xm55R7ONx1s68TRYl8fUgHMqQv/xks8izI1yq6ElcpBJ466cpVqBP9tcXw5bh hPzl/C9jm8p4UMSHFUhCNgjxX9y+fu0AXdh5R2PgGbaC0TMc7Fd6vsjHlbK5srDpppYIzpM r9xACMd9wlVE7Ki3puZFw== X-UI-Out-Filterresults: notjunk:1; V01:K0:OWf9QYHLz48=:Ze0Ctk9ybas7UKI7gRhkM2 g9/ALM6r7teJwabCDy7o2xPeziTXW5NSb/VUSDVlZt8NwIlPwfE0Q+4nhakwUtRBggxYw7qbF GyhmRhE0nS3UIj7jHQCWDcFK9nE4Ypin+XH2v2/m0JNfIhXH77Idt32WH6N6Jpjmx9FtkaB5k 2AzLW6JmyBFQfTcUlnXFc6FBFHfXwpBhfmA7OfnnjaaRSzWfcdfRVmqrsX+j2B+wM3Lna1NTK o+vgRlRvXelRa8q1Vj8I+Sa4ci+pH2dk42atI1V1n1W/Jx/6BGjq2u+9hoVE26bdt+dRoOXrs F800zbWy1cQ8LFGpnEWIEDV3TZ/OQAZe+xKwHKX8VRs/XYmQ3n6czw68IjV0ibi0OstVpU5YN F3mZVQj0q1L/XIK2Aob25cMTO8kRel3rJXnY8rOSsOxr26zuRQK6IWv7/q5gNirSLnW9uI8Ub N3gVSjDGXLR+nMETBUzbrrVDlkURxdXr5BdItDlbbqu9ZoTNgirwBDv1Ay0KR/ekpkEjy6wSq rOTwMNbF9rarOQDbkNSzRkS2JsrIpEu5cvJh0uOPaWq+QEaaJM55vMN2YydJ2cTbhFpwuGtU6 PgDnOxLiEDUm/UNesRsOtCGEphrFsfdxajuL0nPDNkEWQ/A4npPOSpoicUCgLpdzb9WMkGG7Q iT5bBtg9/1Tidf4zIDllyCFP2/yoySixKce5J72ushGV1gtEOuch8AyzWZIddZQLt4Ks= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The newly added nilfs_msg() infrastructure caused a warning in nilfs_clear_dirty_page() when it is disabled: fs/nilfs2/page.c: In function 'nilfs_clear_dirty_page': fs/nilfs2/page.c:402:22: error: unused variable 'sb' [-Werror=unused-variable] struct super_block *sb = inode->i_sb; We can avoid the warning by adding a cast to void for the first argument of the macro. Signed-off-by: Arnd Bergmann Fixes: aede53d223f0 ("nilfs2: replace nilfs_warning() with nilfs_msg()") --- fs/nilfs2/nilfs.h | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) -- 2.9.0 diff --git a/fs/nilfs2/nilfs.h b/fs/nilfs2/nilfs.h index b7064faef217..46fbd4e00315 100644 --- a/fs/nilfs2/nilfs.h +++ b/fs/nilfs2/nilfs.h @@ -317,7 +317,10 @@ void __nilfs_error(struct super_block *sb, const char *function, #else #define nilfs_msg(sb, level, fmt, ...) \ - no_printk(fmt, ##__VA_ARGS__) + do { \ + no_printk(fmt, ##__VA_ARGS__); \ + (void)(sb); \ + } while (0) #define nilfs_error(sb, fmt, ...) \ do { \ no_printk(fmt, ##__VA_ARGS__); \