Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp5636006rwb; Mon, 5 Dec 2022 01:48:49 -0800 (PST) X-Google-Smtp-Source: AA0mqf5qUBnZWGd6OaKEVb+Oco1rEeQkP/9JJ+lI5NhVPPkBLQBEUgJW0CNtz6CxHig4NbEy4Odd X-Received: by 2002:a17:90a:cf02:b0:219:63d9:5167 with SMTP id h2-20020a17090acf0200b0021963d95167mr27122392pju.204.1670233729438; Mon, 05 Dec 2022 01:48:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670233729; cv=none; d=google.com; s=arc-20160816; b=n1ZUIA//0ZADsXMgvGGEt4J2bVQGG4vKpZv0qLk0XofUFG2atdQgpCSuc4Zc+dOM39 n67Jf4oU3Z/th1b/bHR+ZiEedIum+QDPfhg2heP2mSX3mCmFilR4ONn2o4gPdGxx4N26 2E8iosB5oA6iTMNKEeHFdBe++QFk+2/zdYfFUwzUXWk/38M17oIeLkosgIGMp1/vx4+V Eldx0edCzZkcxBTSq2LYZSLEaQIkqSYmL9d83Gn6xYXj8Q9G5swNixi+zqdB7Q5FqmFp To5mRJ8ky1NOCXnmU9WioaBGX8tC01wlx3MjUUxNeuOuW6YRRuN7qHrfG0hONkf9c/sH SUjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=meRI3O+4cufvzmfPJuPlXGFwIuYkTBdV9Lqea5cQQvk=; b=vKDDe3WmhZyMcrcvQDAJDyDiKNnBkvg4HlyvGdo2FFWSdh0OpcecyA8UUG8WN8CEtq D690rslk9oO6Y/xBMc1rVeECRdCvPr+pwusSsGnEHV+B0d1QjIIoHDpatW9A3F82Z4+A C5S7zFmxF69eesgQ/ZYOVCeaZiiixySMDbKQmYO+rlaiWizpaNz4hdJifeeX1pfUfjKo rZfbXjlj6BzBejsWQICPHH11Wy9FJwrL70IX0qDMoL0YnILf1pPmyfhdkZ5K3g+mtCJu NUJT2Pe5M7fH0QYVNz75WowUn83zBgSuyFW3s9cHSL04o1BZP7Tw98z6sdQloFUqCDAK 7oqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Ewk8yMS+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r10-20020a63d90a000000b004787004c8dasi12321101pgg.123.2022.12.05.01.48.39; Mon, 05 Dec 2022 01:48:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Ewk8yMS+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230169AbiLEJNn (ORCPT + 82 others); Mon, 5 Dec 2022 04:13:43 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33286 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230154AbiLEJNZ (ORCPT ); Mon, 5 Dec 2022 04:13:25 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D86D8B7B; Mon, 5 Dec 2022 01:13:24 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 60507B80D8B; Mon, 5 Dec 2022 09:13:23 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id A280EC433C1; Mon, 5 Dec 2022 09:13:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1670231602; bh=BxyB9UbcH7VMa4LZtCngzzb08+kauzvcdH5JV40PM6o=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=Ewk8yMS+YVNKhle2v6S8qXC/9kE/yOPobcpuNGnGZ+I7WFAZeGrxiQJEtzX3wI8sr 8g9/fNnprw5Rg47kBQIUPWlxKZ4H/0/4AjVEsaV9zuVes49nYheTc7KBpLOk38zodQ izkG4nJobxvVEDRfvjatgUMwDD5+Mu4dp6a3aUHDRDbalaqSBmfMTsb9xMIhMoVIf9 Nganxkt67B8I+SY5Gp4az3B5Kx55WJ7bAG+7vEH/DifQRdZanypMH2jBHAnHHdVe31 MqSZesfugHGzQL8U4EdI/D+p51iB/0w2++1jGLcxfFWUiAJMmoSXuAkBIvxOEMftQ7 eUzKJUJo58eBg== From: =?utf-8?B?QmrDtnJuIFTDtnBlbA==?= To: guoren@kernel.org, arnd@arndb.de, guoren@kernel.org, palmer@rivosinc.com, tglx@linutronix.de, peterz@infradead.org, luto@kernel.org, conor.dooley@microchip.com, heiko@sntech.de, jszhang@kernel.org, lazyparser@gmail.com, falcon@tinylab.org, chenhuacai@kernel.org, apatel@ventanamicro.com, atishp@atishpatra.org, palmer@dabbelt.com, paul.walmsley@sifive.com, mark.rutland@arm.com, zouyipeng@huawei.com, bigeasy@linutronix.de, David.Laight@aculab.com, chenzhongjin@huawei.com, greentime.hu@sifive.com, andy.chiu@sifive.com Cc: linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org, Guo Ren , kernel test robot Subject: Re: [PATCH -next V8 02/14] riscv: elf_kexec: Fixup compile warning In-Reply-To: <20221103075047.1634923-3-guoren@kernel.org> References: <20221103075047.1634923-1-guoren@kernel.org> <20221103075047.1634923-3-guoren@kernel.org> Date: Mon, 05 Dec 2022 10:13:19 +0100 Message-ID: <87iliq9psg.fsf@all.your.base.are.belong.to.us> MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org guoren@kernel.org writes: > From: Guo Ren > > If CRYTPO or CRYPTO_SHA256 or KEXE_FILE is not enabled, then: > > COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-12.1.0 make.cross W=1 > O=build_dir ARCH=riscv SHELL=/bin/bash arch/riscv/ > > ../arch/riscv/kernel/elf_kexec.c: In function 'elf_kexec_load': > ../arch/riscv/kernel/elf_kexec.c:185:23: warning: variable > 'kernel_start' set but not used [-Wunused-but-set-variable] > 185 | unsigned long kernel_start; > | ^~~~~~~~~~~~ > > Fixes: 838b3e28488f ("RISC-V: Load purgatory in kexec_file") > Signed-off-by: Guo Ren > Signed-off-by: Guo Ren > Reviewed-by: Conor Dooley > Reported-by: kernel test robot > --- > arch/riscv/kernel/elf_kexec.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/arch/riscv/kernel/elf_kexec.c b/arch/riscv/kernel/elf_kexec.c > index 0cb94992c15b..4b9264340b78 100644 > --- a/arch/riscv/kernel/elf_kexec.c > +++ b/arch/riscv/kernel/elf_kexec.c > @@ -198,7 +198,7 @@ static void *elf_kexec_load(struct kimage *image, char *kernel_buf, > if (ret) > goto out; > kernel_start = image->start; > - pr_notice("The entry point of kernel at 0x%lx\n", image->start); > + pr_notice("The entry point of kernel at 0x%lx\n", kernel_start); This patch shouldn't be part of the generic entry series. It's just a generic fix! Please have this as a separate patch.