From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 06AFCC433F5 for ; Tue, 23 Nov 2021 20:40:10 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 387A06B0072; Tue, 23 Nov 2021 15:39:55 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 337946B0074; Tue, 23 Nov 2021 15:39:55 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 1FFEF6B0075; Tue, 23 Nov 2021 15:39:55 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0215.hostedemail.com [216.40.44.215]) by kanga.kvack.org (Postfix) with ESMTP id 1193E6B0072 for ; Tue, 23 Nov 2021 15:39:55 -0500 (EST) Received: from smtpin05.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay03.hostedemail.com (Postfix) with ESMTP id D35F9824C452 for ; Tue, 23 Nov 2021 20:39:44 +0000 (UTC) X-FDA: 78841361340.05.98E2AB4 Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by imf09.hostedemail.com (Postfix) with ESMTP id B67FD300012C for ; Tue, 23 Nov 2021 20:39:40 +0000 (UTC) X-IronPort-AV: E=McAfee;i="6200,9189,10177"; a="232621759" X-IronPort-AV: E=Sophos;i="5.87,258,1631602800"; d="scan'208";a="232621759" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Nov 2021 12:38:53 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.87,258,1631602800"; d="scan'208";a="606956871" Received: from lkp-server02.sh.intel.com (HELO 9e1e9f9b3bcb) ([10.239.97.151]) by orsmga004.jf.intel.com with ESMTP; 23 Nov 2021 12:38:51 -0800 Received: from kbuild by 9e1e9f9b3bcb with local (Exim 4.92) (envelope-from ) id 1mpcZ0-0002Gd-8d; Tue, 23 Nov 2021 20:38:50 +0000 Date: Wed, 24 Nov 2021 04:37:53 +0800 From: kernel test robot To: Alistair Popple Cc: kbuild-all@lists.01.org, linux-kernel@vger.kernel.org, Dan Carpenter , Christoph Hellwig , Andrew Morton , Linux Memory Management List Subject: mm/memory.c:709:25: sparse: sparse: cast to non-scalar Message-ID: <202111240450.3z7aF31U-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-Rspamd-Server: rspam12 X-Rspamd-Queue-Id: B67FD300012C Authentication-Results: imf09.hostedemail.com; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=intel.com (policy=none); spf=none (imf09.hostedemail.com: domain of lkp@intel.com has no SPF policy when checking 192.55.52.93) smtp.mailfrom=lkp@intel.com X-Stat-Signature: yzjxhghs5sh1b6crqi9o5j5memipycaj X-HE-Tag: 1637699980-597421 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master head: 136057256686de39cc3a07c2e39ef6bc43003ff6 commit: b756a3b5e7ead8f6f4b03cea8ac22478ce04c8a8 mm: device exclusive memory access date: 5 months ago config: alpha-randconfig-s031-20211122 (https://download.01.org/0day-ci/archive/20211124/202111240450.3z7aF31U-lkp@intel.com/config.gz) compiler: alpha-linux-gcc (GCC) 11.2.0 reproduce: wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # apt-get install sparse # sparse version: v0.6.4-dirty # https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b756a3b5e7ead8f6f4b03cea8ac22478ce04c8a8 git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git git fetch --no-tags linus master git checkout b756a3b5e7ead8f6f4b03cea8ac22478ce04c8a8 # save the config file to linux build tree COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-11.2.0 make.cross C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=alpha SHELL=/bin/bash If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot sparse warnings: (new ones prefixed by >>) >> mm/memory.c:709:25: sparse: sparse: cast to non-scalar >> mm/memory.c:709:25: sparse: sparse: cast from non-scalar mm/memory.c:1023:17: sparse: sparse: context imbalance in 'copy_pte_range' - different lock contexts for basic block mm/memory.c:1736:16: sparse: sparse: context imbalance in '__get_locked_pte' - different lock contexts for basic block mm/memory.c:1785:9: sparse: sparse: context imbalance in 'insert_page' - different lock contexts for basic block mm/memory.c:2287:17: sparse: sparse: context imbalance in 'remap_pte_range' - different lock contexts for basic block mm/memory.c:2543:17: sparse: sparse: context imbalance in 'apply_to_pte_range' - unexpected unlock mm/memory.c:2831:17: sparse: sparse: context imbalance in 'wp_page_copy' - unexpected unlock mm/memory.c:3180:17: sparse: sparse: context imbalance in 'wp_pfn_shared' - unexpected unlock mm/memory.c:3243:19: sparse: sparse: context imbalance in 'do_wp_page' - different lock contexts for basic block mm/memory.c: note: in included file (through include/linux/mm.h, arch/alpha/include/asm/io.h, include/linux/io.h, include/linux/irq.h, ...): include/linux/pgtable.h:275:16: sparse: sparse: cast to non-scalar include/linux/pgtable.h:275:16: sparse: sparse: cast from non-scalar mm/memory.c:4874:5: sparse: sparse: context imbalance in 'follow_invalidate_pte' - different lock contexts for basic block mm/memory.c:4995:9: sparse: sparse: context imbalance in 'follow_pfn' - unexpected unlock vim +709 mm/memory.c 701 702 static void restore_exclusive_pte(struct vm_area_struct *vma, 703 struct page *page, unsigned long address, 704 pte_t *ptep) 705 { 706 pte_t pte; 707 swp_entry_t entry; 708 > 709 pte = pte_mkold(mk_pte(page, READ_ONCE(vma->vm_page_prot))); 710 if (pte_swp_soft_dirty(*ptep)) 711 pte = pte_mksoft_dirty(pte); 712 713 entry = pte_to_swp_entry(*ptep); 714 if (pte_swp_uffd_wp(*ptep)) 715 pte = pte_mkuffd_wp(pte); 716 else if (is_writable_device_exclusive_entry(entry)) 717 pte = maybe_mkwrite(pte_mkdirty(pte), vma); 718 719 set_pte_at(vma->vm_mm, address, ptep, pte); 720 721 /* 722 * No need to take a page reference as one was already 723 * created when the swap entry was made. 724 */ 725 if (PageAnon(page)) 726 page_add_anon_rmap(page, vma, address, false); 727 else 728 /* 729 * Currently device exclusive access only supports anonymous 730 * memory so the entry shouldn't point to a filebacked page. 731 */ 732 WARN_ON_ONCE(!PageAnon(page)); 733 734 if (vma->vm_flags & VM_LOCKED) 735 mlock_vma_page(page); 736 737 /* 738 * No need to invalidate - it was non-present before. However 739 * secondary CPUs may have mappings that need invalidating. 740 */ 741 update_mmu_cache(vma, address, ptep); 742 } 743 --- 0-DAY CI Kernel Test Service, Intel Corporation https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org