Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp1873042ybd; Sun, 23 Jun 2019 18:54:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqxqM9HZW1Lm6wN2q1MUGcz8Nj4BVEIEtMRLwO4yxsTSKg4c95ezU9BbrHfpW/YMI0h/62cT X-Received: by 2002:a63:d24f:: with SMTP id t15mr27339965pgi.301.1561341273267; Sun, 23 Jun 2019 18:54:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561341273; cv=none; d=google.com; s=arc-20160816; b=GAOkYYsM3QV2qLYfNjNJrYA4jEZ9a4WhriV5F226DgJPjJYxfLZJ2UnPdudWM7AkVC pzlNi7dbVlovkui9AezBt96goTClQFHhzGHnCjs6q8eHz+RPvbJF5XXwfyxt7Amueof2 7m5uJufzHRxSCsijezXjoqv93fNGScB/ggQfqAB5WcSDzYZ1sFBDJj6nJ1B2cP6K+QCe UBBNdXNLgBJzuqGrH+goYo/H3SmeP/sXg0uVK9o0RctM4XSZ6uhdrsaadO0ZBDeHcxQq q7XZLBuuaYfrkLPKYSgny3rmb3rfCjQoNtxPFaHNgD+tcQ+0KOmswWkRbCQTtIyxbE++ sIYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=pyih7VXypWI5Sb52ldsdfYwabwagtsf0k0Z+auQcR60=; b=L5rH4yekyDkCXyrwzkIyne+yM349vSLfmnuwpifaChY3J7ArIewKOK1xtdkxOo6pD1 jWujuYRbtvvAuskKX8M+tFb1u6qn25MrcIxa9Zefk/eAwOC4CJ/Xqge5OuRjmCfDtRMq UoS6zUYelsUBNFp0vA5a6uVfoa77TwFkd1zICd8GobGmeU77xj7FpwjR4q+uJnF6mjZg E26m0ZyIPyy4dayJ2el92Ei59mwWN3wZVxqQkAlBrEEkFUlEbyDw2m1Qkj5pfch8n1WE CLurM13ViUIMGZbNq4X8OaB+U0YewBARVAbIYcHNQ9J4deWMtc5mMN4O03mdGIaoZIWV ZX6A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w23si8953010ply.230.2019.06.23.18.54.17; Sun, 23 Jun 2019 18:54:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726419AbfFXByH (ORCPT + 99 others); Sun, 23 Jun 2019 21:54:07 -0400 Received: from mx1.redhat.com ([209.132.183.28]:38686 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726323AbfFXByH (ORCPT ); Sun, 23 Jun 2019 21:54:07 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id A7D4A30832CE; Mon, 24 Jun 2019 01:54:06 +0000 (UTC) Received: from dhcp-128-65.nay.redhat.com (ovpn-12-23.pek2.redhat.com [10.72.12.23]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 60D995D739; Mon, 24 Jun 2019 01:54:03 +0000 (UTC) Date: Mon, 24 Jun 2019 09:53:59 +0800 From: Dave Young To: Tiezhu Yang Cc: tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, x86@kernel.org, linux-kernel@vger.kernel.org, vgoyal@redhat.com Subject: Re: [PATCH v2] kexec: fix warnig of crash_zero_bytes in crash.c Message-ID: <20190624015359.GC2976@dhcp-128-65.nay.redhat.com> References: <43d6fe3a.18e.16b814a09ba.Coremail.kernelpatch@126.com> <20190624013520.GA2976@dhcp-128-65.nay.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20190624013520.GA2976@dhcp-128-65.nay.redhat.com> User-Agent: Mutt/1.11.3 (2019-02-01) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.44]); Mon, 24 Jun 2019 01:54:06 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 06/24/19 at 09:35am, Dave Young wrote: > On 06/23/19 at 06:24am, Tiezhu Yang wrote: > > Fix the following sparse warning: > > > > arch/x86/kernel/crash.c:59:15: > > warning: symbol 'crash_zero_bytes' was not declared. Should it be static? > > > > First, make crash_zero_bytes static. In addition, crash_zero_bytes > > is used when CONFIG_KEXEC_FILE is set, so make it only available > > under CONFIG_KEXEC_FILE. Otherwise, if CONFIG_KEXEC_FILE is not set, > > the following warning will appear when make crash_zero_bytes static: > > > > arch/x86/kernel/crash.c:59:22: > > warning: ‘crash_zero_bytes’ defined but not used [-Wunused-variable] > > > > Fixes: dd5f726076cc ("kexec: support for kexec on panic using new system call") > > Signed-off-by: Tiezhu Yang > > Cc: Vivek Goyal > > --- > > arch/x86/kernel/crash.c | 4 +++- > > 1 file changed, 3 insertions(+), 1 deletion(-) > > > > diff --git a/arch/x86/kernel/crash.c b/arch/x86/kernel/crash.c > > index 576b2e1..f13480e 100644 > > --- a/arch/x86/kernel/crash.c > > +++ b/arch/x86/kernel/crash.c > > @@ -56,7 +56,9 @@ struct crash_memmap_data { > > */ > > crash_vmclear_fn __rcu *crash_vmclear_loaded_vmcss = NULL; > > EXPORT_SYMBOL_GPL(crash_vmclear_loaded_vmcss); > > -unsigned long crash_zero_bytes; > > +#ifdef CONFIG_KEXEC_FILE > > +static unsigned long crash_zero_bytes; > > +#endif > > > > static inline void cpu_crash_vmclear_loaded_vmcss(void) > > { > > -- > > 1.8.3.1 > > Acked-by: Dave Young BTW, a soft reminder, for kexec patches, it would be better to cc kexec mail list. > > Thanks > Dave >