[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <202410200112.Ut6HtXKD-lkp@intel.com>
Date: Sun, 20 Oct 2024 01:28:59 +0800
From: kernel test robot <lkp@...el.com>
To: "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>,
Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
Dave Hansen <dave.hansen@...ux.intel.com>, x86@...nel.org,
"H. Peter Anvin" <hpa@...or.com>, Andy Lutomirski <luto@...nel.org>
Cc: oe-kbuild-all@...ts.linux.dev, Albert Ou <aou@...s.berkeley.edu>,
Alexei Starovoitov <ast@...nel.org>,
Andrea Parri <parri.andrea@...il.com>,
Arnd Bergmann <arnd@...db.de>,
Daniel Borkmann <daniel@...earbox.net>,
Eric Chan <ericchancf@...gle.com>, Jason Gunthorpe <jgg@...pe.ca>,
Kai Huang <kai.huang@...el.com>,
Kefeng Wang <wangkefeng.wang@...wei.com>,
Kent Overstreet <kent.overstreet@...ux.dev>,
Palmer Dabbelt <palmer@...osinc.com>,
Paul Walmsley <paul.walmsley@...ive.com>,
Russell King <linux@...linux.org.uk>,
Samuel Holland <samuel.holland@...ive.com>,
Suren Baghdasaryan <surenb@...gle.com>,
Yuntao Wang <ytcoode@...il.com>,
linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org,
linux-riscv@...ts.infradead.org,
"Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>,
Tom Lendacky <thomas.lendacky@....com>,
Ashish Kalra <ashish.kalra@....com>,
"Maciej W. Rozycki" <macro@...am.me.uk>
Subject: Re: [PATCH 2/2] x86/mm: Make memremap(MEMREMAP_WB) map memory as
encrypted by default
Hi Kirill,
kernel test robot noticed the following build warnings:
[auto build test WARNING on tip/master]
[also build test WARNING on tip/x86/mm linus/master tip/auto-latest tip/x86/core v6.12-rc3 next-20241018]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch#_base_tree_information]
url: https://github.com/intel-lab-lkp/linux/commits/Kirill-A-Shutemov/memremap-Pass-down-MEMREMAP_-flags-to-arch_memremap_wb/20241018-001138
base: tip/master
patch link: https://lore.kernel.org/r/20241017155642.1942514-3-kirill.shutemov%40linux.intel.com
patch subject: [PATCH 2/2] x86/mm: Make memremap(MEMREMAP_WB) map memory as encrypted by default
config: i386-randconfig-061-20241019 (https://download.01.org/0day-ci/archive/20241020/202410200112.Ut6HtXKD-lkp@intel.com/config)
compiler: gcc-12 (Debian 12.2.0-14) 12.2.0
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20241020/202410200112.Ut6HtXKD-lkp@intel.com/reproduce)
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202410200112.Ut6HtXKD-lkp@intel.com/
sparse warnings: (new ones prefixed by >>)
>> arch/x86/mm/ioremap.c:509:37: sparse: sparse: incorrect type in return expression (different address spaces) @@ expected void * @@ got void [noderef] __iomem * @@
arch/x86/mm/ioremap.c:509:37: sparse: expected void *
arch/x86/mm/ioremap.c:509:37: sparse: got void [noderef] __iomem *
arch/x86/mm/ioremap.c:511:33: sparse: sparse: incorrect type in return expression (different address spaces) @@ expected void * @@ got void [noderef] __iomem * @@
arch/x86/mm/ioremap.c:511:33: sparse: expected void *
arch/x86/mm/ioremap.c:511:33: sparse: got void [noderef] __iomem *
vim +509 arch/x86/mm/ioremap.c
505
506 void *arch_memremap_wb(phys_addr_t phys_addr, size_t size, unsigned long flags)
507 {
508 if (flags & MEMREMAP_DEC)
> 509 return ioremap_cache(phys_addr, size);
510
511 return ioremap_encrypted(phys_addr, size);
512 }
513
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
Powered by blists - more mailing lists