From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id B6ACEC433F5 for ; Wed, 13 Apr 2022 17:17:33 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 2A6CF6B0074; Wed, 13 Apr 2022 13:17:33 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 256BC6B0075; Wed, 13 Apr 2022 13:17:33 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 0F74B6B0078; Wed, 13 Apr 2022 13:17:33 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0004.hostedemail.com [216.40.44.4]) by kanga.kvack.org (Postfix) with ESMTP id F41DA6B0074 for ; Wed, 13 Apr 2022 13:17:32 -0400 (EDT) Received: from smtpin22.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id 9EF5EA7ACC for ; Wed, 13 Apr 2022 17:17:32 +0000 (UTC) X-FDA: 79352512344.22.BFB4090 Received: from mga11.intel.com (mga11.intel.com [192.55.52.93]) by imf13.hostedemail.com (Postfix) with ESMTP id B7C6820005 for ; Wed, 13 Apr 2022 17:17:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1649870251; x=1681406251; h=date:from:to:cc:subject:message-id:mime-version; bh=+kZS7nTrR6/ATZDNRL+ftF1Z9K/m9dmWqEXlBY+C2Fc=; b=L+va+JGEjbeKivN4A5OrCdAsNZoH9fhqyg9VDvHC6wdEay8uhggjUygl osOuevrFSY3oaiSZArA9CuiSXQLGj36IV+xgxefeuCIGB+Bqxw3/rxifx ovsSkYtNLkmen631jmLHY5veiIogBMkd5p+R4qwuGrhVJwZNffW4+coYE UcJHYsakoclML+kLU9vUxHU9RdGwSOkqNewSFZ3MdljtFt/cxU3wsi876 7F82LVQ9XuoQfIIkksP7RMJ1Ky5m9kLlUkSsJtFd5DQ/1MlUnxkqM5/Qf /gFPwthAxrEMQKv5tNqNEGZ9W+s7AzIA0/fmi+YG44YB2+WZxRitvU2YW w==; X-IronPort-AV: E=McAfee;i="6400,9594,10316"; a="260320898" X-IronPort-AV: E=Sophos;i="5.90,257,1643702400"; d="scan'208";a="260320898" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Apr 2022 10:17:30 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,257,1643702400"; d="scan'208";a="611966944" Received: from lkp-server01.sh.intel.com (HELO 3abc53900bec) ([10.239.97.150]) by fmsmga008.fm.intel.com with ESMTP; 13 Apr 2022 10:17:29 -0700 Received: from kbuild by 3abc53900bec with local (Exim 4.95) (envelope-from ) id 1negcS-0000U4-I5; Wed, 13 Apr 2022 17:17:28 +0000 Date: Thu, 14 Apr 2022 01:16:26 +0800 From: kernel test robot To: Peter Xu Cc: kbuild-all@lists.01.org, Linux Memory Management List , Mike Kravetz , Andrew Morton Subject: [linux-next:master 3841/3955] mm/memory.c:1678:67: sparse: sparse: incorrect type in initializer (different base types) Message-ID: <202204140108.DeRAhWEn-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-Rspam-User: Authentication-Results: imf13.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=L+va+JGE; spf=none (imf13.hostedemail.com: domain of lkp@intel.com has no SPF policy when checking 192.55.52.93) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com X-Rspamd-Server: rspam03 X-Rspamd-Queue-Id: B7C6820005 X-Stat-Signature: 6dcteg8xceubfpctwh55iwh8k9sj774s X-HE-Tag: 1649870251-642176 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master head: c97e430ab5539993ab2afc6e80deea80aef9d799 commit: afbef99a0e4dfb0eda864ae9d3c78c9d9ed750ba [3841/3955] mm/hugetlb: only drop uffd-wp special pte if required config: i386-randconfig-s002 (https://download.01.org/0day-ci/archive/20220414/202204140108.DeRAhWEn-lkp@intel.com/config) compiler: gcc-11 (Debian 11.2.0-19) 11.2.0 reproduce: # apt-get install sparse # sparse version: v0.6.4-dirty # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=afbef99a0e4dfb0eda864ae9d3c78c9d9ed750ba git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git git fetch --no-tags linux-next master git checkout afbef99a0e4dfb0eda864ae9d3c78c9d9ed750ba # save the config file to linux build tree mkdir build_dir make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=i386 SHELL=/bin/bash fs/hugetlbfs/ mm/ If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot sparse warnings: (new ones prefixed by >>) mm/memory.c:1238:1: sparse: sparse: symbol 'vma_needs_copy' was not declared. Should it be static? >> mm/memory.c:1678:67: sparse: sparse: incorrect type in initializer (different base types) @@ expected unsigned long zap_flags @@ got restricted zap_flags_t @@ mm/memory.c:1678:67: sparse: expected unsigned long zap_flags mm/memory.c:1678:67: sparse: got restricted zap_flags_t mm/memory.c:1031:17: sparse: sparse: context imbalance in 'copy_pte_range' - different lock contexts for basic block mm/memory.c:1830:16: sparse: sparse: context imbalance in '__get_locked_pte' - different lock contexts for basic block mm/memory.c:1878:9: sparse: sparse: context imbalance in 'insert_page' - different lock contexts for basic block mm/memory.c:2380:17: sparse: sparse: context imbalance in 'remap_pte_range' - different lock contexts for basic block mm/memory.c:2636:17: sparse: sparse: context imbalance in 'apply_to_pte_range' - unexpected unlock mm/memory.c:2925:9: sparse: sparse: context imbalance in 'wp_page_copy' - different lock contexts for basic block mm/memory.c:3277:17: sparse: sparse: context imbalance in 'wp_pfn_shared' - unexpected unlock mm/memory.c:3344:19: sparse: sparse: context imbalance in 'do_wp_page' - different lock contexts for basic block mm/memory.c:5214:5: sparse: sparse: context imbalance in 'follow_invalidate_pte' - wrong count at exit mm/memory.c:5335:23: sparse: sparse: context imbalance in 'follow_pfn' - unexpected unlock mm/memory.c:5365:9: sparse: sparse: context imbalance in 'follow_phys' - unexpected unlock mm/memory.c:5399:9: sparse: sparse: context imbalance in 'generic_access_phys' - unexpected unlock -- >> mm/hugetlb.c:5013:43: sparse: sparse: restricted zap_flags_t degrades to integer mm/hugetlb.c:5047:35: sparse: sparse: restricted zap_flags_t degrades to integer mm/hugetlb.c:460:12: sparse: sparse: context imbalance in 'allocate_file_region_entries' - wrong count at exit mm/hugetlb.c:533:13: sparse: sparse: context imbalance in 'region_add' - wrong count at exit mm/hugetlb.c:600:13: sparse: sparse: context imbalance in 'region_chg' - wrong count at exit mm/hugetlb.c: note: in included file: include/linux/mm.h:1304:17: sparse: sparse: context imbalance in 'demote_free_huge_page' - unexpected unlock mm/hugetlb.c:4896:20: sparse: sparse: context imbalance in 'move_huge_pte' - different lock contexts for basic block include/linux/mm.h:1165:22: sparse: sparse: context imbalance in 'hugetlb_wp' - unexpected unlock mm/hugetlb.c:6127:25: sparse: sparse: context imbalance in 'follow_hugetlb_page' - different lock contexts for basic block -- >> fs/hugetlbfs/inode.c:521:41: sparse: sparse: incorrect type in argument 4 (different base types) @@ expected unsigned long zap_flags @@ got restricted zap_flags_t [usertype] @@ fs/hugetlbfs/inode.c:521:41: sparse: expected unsigned long zap_flags fs/hugetlbfs/inode.c:521:41: sparse: got restricted zap_flags_t [usertype] fs/hugetlbfs/inode.c:588:39: sparse: sparse: incorrect type in argument 4 (different base types) @@ expected unsigned long zap_flags @@ got restricted zap_flags_t [usertype] @@ fs/hugetlbfs/inode.c:588:39: sparse: expected unsigned long zap_flags fs/hugetlbfs/inode.c:588:39: sparse: got restricted zap_flags_t [usertype] vim +1678 mm/memory.c 1642 1643 1644 static void unmap_single_vma(struct mmu_gather *tlb, 1645 struct vm_area_struct *vma, unsigned long start_addr, 1646 unsigned long end_addr, 1647 struct zap_details *details) 1648 { 1649 unsigned long start = max(vma->vm_start, start_addr); 1650 unsigned long end; 1651 1652 if (start >= vma->vm_end) 1653 return; 1654 end = min(vma->vm_end, end_addr); 1655 if (end <= vma->vm_start) 1656 return; 1657 1658 if (vma->vm_file) 1659 uprobe_munmap(vma, start, end); 1660 1661 if (unlikely(vma->vm_flags & VM_PFNMAP)) 1662 untrack_pfn(vma, 0, 0); 1663 1664 if (start != end) { 1665 if (unlikely(is_vm_hugetlb_page(vma))) { 1666 /* 1667 * It is undesirable to test vma->vm_file as it 1668 * should be non-null for valid hugetlb area. 1669 * However, vm_file will be NULL in the error 1670 * cleanup path of mmap_region. When 1671 * hugetlbfs ->mmap method fails, 1672 * mmap_region() nullifies vma->vm_file 1673 * before calling this function to clean up. 1674 * Since no pte has actually been setup, it is 1675 * safe to do nothing in this case. 1676 */ 1677 if (vma->vm_file) { > 1678 unsigned long zap_flags = details ? 1679 details->zap_flags : 0; 1680 i_mmap_lock_write(vma->vm_file->f_mapping); 1681 __unmap_hugepage_range_final(tlb, vma, start, end, 1682 NULL, zap_flags); 1683 i_mmap_unlock_write(vma->vm_file->f_mapping); 1684 } 1685 } else 1686 unmap_page_range(tlb, vma, start, end, details); 1687 } 1688 } 1689 -- 0-DAY CI Kernel Test Service https://01.org/lkp