From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4594FC433F5 for ; Sat, 7 May 2022 01:29:04 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B2AEE6B0071; Fri, 6 May 2022 21:29:03 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id ADA336B0073; Fri, 6 May 2022 21:29:03 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 97A986B0074; Fri, 6 May 2022 21:29:03 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 82EC36B0071 for ; Fri, 6 May 2022 21:29:03 -0400 (EDT) Received: from smtpin12.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay12.hostedemail.com (Postfix) with ESMTP id 54AA41211D8 for ; Sat, 7 May 2022 01:29:03 +0000 (UTC) X-FDA: 79437213366.12.8C78D79 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by imf10.hostedemail.com (Postfix) with ESMTP id 6DF63C0014 for ; Sat, 7 May 2022 01:28:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1651886942; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=M43EWFcpxnEaKiDdqgESoMWVntbFu+gDlDpNZhyaL4E=; b=WS5BU+T8amTeiV9i6i30Nt5Hwj7rqUJpGMsZDzBi8vBp/oBR1eVlcR358M1tqKFdGcB2Dv jWb4weZXx2lZLke5RFjlUq9gXyyYrP5DSTojOwdjS/cLrGgdu7IBDOENIg89Yq6oNLcbXy hCfRv7cB5B3XZhHhdUvOe+Udkx/awsE= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-363-C0cOfTHmPOiBX3kY1Xc23g-1; Fri, 06 May 2022 21:28:58 -0400 X-MC-Unique: C0cOfTHmPOiBX3kY1Xc23g-1 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 793A41C0519C; Sat, 7 May 2022 01:28:58 +0000 (UTC) Received: from localhost (ovpn-13-18.pek2.redhat.com [10.72.13.18]) by smtp.corp.redhat.com (Postfix) with ESMTPS id ADD4A2024CB9; Sat, 7 May 2022 01:28:55 +0000 (UTC) Date: Sat, 7 May 2022 09:28:52 +0800 From: Baoquan He To: kernel test robot Cc: "Matthew Wilcox (Oracle)" , kbuild-all@lists.01.org, Linux Memory Management List , Andrew Morton , Christoph Hellwig Subject: Re: [linux-next:master 7193/9759] arch/sh/kernel/crash_dump.c:23:36: sparse: sparse: incorrect type in argument 1 (different address spaces) Message-ID: References: <202205062129.oGoY3bdy-lkp@intel.com> MIME-Version: 1.0 In-Reply-To: <202205062129.oGoY3bdy-lkp@intel.com> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Stat-Signature: ffxjo3a3crz6cfb3uqm4dwxopi4c5ysr X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: 6DF63C0014 X-Rspam-User: Authentication-Results: imf10.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=WS5BU+T8; dmarc=pass (policy=none) header.from=redhat.com; spf=none (imf10.hostedemail.com: domain of bhe@redhat.com has no SPF policy when checking 170.10.129.124) smtp.mailfrom=bhe@redhat.com X-HE-Tag: 1651886924-396456 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On 05/06/22 at 09:59pm, kernel test robot wrote: > tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master > head: 38a288f5941ef03752887ad86f2d85442358c99a > commit: 5d8de293c224896a4da99763fce4f9794308caf4 [7193/9759] vmcore: convert copy_oldmem_page() to take an iov_iter This is an existed warning, not related to the code change in patch "vmcore: convert copy_oldmem_page() to take an iov_iter". I have queued a patch to fix the warning, will send it to SuperH maintainer. > config: sh-randconfig-s032-20220506 (https://download.01.org/0day-ci/archive/20220506/202205062129.oGoY3bdy-lkp@intel.com/config) > compiler: sh4-linux-gcc (GCC) 11.3.0 > reproduce: > wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross > chmod +x ~/bin/make.cross > # apt-get install sparse > # sparse version: v0.6.4-dirty > # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=5d8de293c224896a4da99763fce4f9794308caf4 > git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git > git fetch --no-tags linux-next master > git checkout 5d8de293c224896a4da99763fce4f9794308caf4 > # save the config file > mkdir build_dir && cp config build_dir/.config > COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-11.3.0 make.cross C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=sh SHELL=/bin/bash arch/sh/kernel/ > > If you fix the issue, kindly add following tag as appropriate > Reported-by: kernel test robot > > > sparse warnings: (new ones prefixed by >>) > >> arch/sh/kernel/crash_dump.c:23:36: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected void const *addr @@ got void [noderef] __iomem * @@ > arch/sh/kernel/crash_dump.c:23:36: sparse: expected void const *addr > arch/sh/kernel/crash_dump.c:23:36: sparse: got void [noderef] __iomem * > > vim +23 arch/sh/kernel/crash_dump.c > > 13 > 14 ssize_t copy_oldmem_page(struct iov_iter *iter, unsigned long pfn, > 15 size_t csize, unsigned long offset) > 16 { > 17 void __iomem *vaddr; > 18 > 19 if (!csize) > 20 return 0; > 21 > 22 vaddr = ioremap(pfn << PAGE_SHIFT, PAGE_SIZE); > > 23 csize = copy_to_iter(vaddr + offset, csize, iter); > > -- > 0-DAY CI Kernel Test Service > https://01.org/lkp >