Received: by 10.223.164.202 with SMTP id h10csp126616wrb; Mon, 13 Nov 2017 03:56:47 -0800 (PST) X-Google-Smtp-Source: AGs4zMbU1oYrRNqMzunxtU708VWeI2+K6TuoKnXSBQO24isb7BewXWWzJKWAQ4ugPblowwDTytz3 X-Received: by 10.84.132.34 with SMTP id 31mr6704157ple.395.1510574207663; Mon, 13 Nov 2017 03:56:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1510574207; cv=none; d=google.com; s=arc-20160816; b=aSbCZOwn2VlzKJuDXXv6ZvEm63weasd+YkwzVsUOg5NytHH08sG08mDhEUGNheSGTC UkzrLX4faKDWxZXISDUNQNgPrqeF6p3vMcI5+ImpulupTpq9atKsVRZzvdMG0uDPNrXy p2484/nr5ljjoXEU9o4cAS+2OZoWPRIxPMMGGjzBhIR1h3AyhuvvzVvM5zOVCFr9SKc0 gjC+MXfV42WNBpEbOSFGaQiEl9+mpi9UY8x5uoyw/7RlFxvJR3pQ6d3AbHlYFabil8e/ qGxBGV2Iw3fmzEolDzOiVOtgbZUPUdATdLl+t5PS+s4DBVpAXzPE/+qbhfg3C6tXh2j/ FF8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=HOQB8EbkDpFQVARstBXvNfLdLcP+vNNL2nNmsX1CTwU=; b=pbo/HSJLU/q3YwQ7aGm8xIkRUNb50G6dAf1B0WCdi4mWbNNOVot0v1uoDYNJvPrlev g+5WNlCIUjzTvO/QckKKvg6eCgQFVptnHSdDZ0aEErq/NbnILkB/aBbhSpGaBEMPXx9P WmxkIYtnjq+J3lczOvD8ZYmoCCbOmo6qpU5BhjgmGEi4ClCvtRC8JbmiSL7v83soESKb zMHAVCahftHuaAuFdst8VEY0Z2zVSV7I3UUbZDLA5t734bEaisq8itJewvZhWd1uPF3E 7Jdj9mK2qS/iN/VCAxFEJH5FeDlgrOJv3zzcxTjRqjcaS2GYRo51XSRwVE26h2VK1dAm IQiw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 64si13990312ply.756.2017.11.13.03.56.33; Mon, 13 Nov 2017 03:56:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752705AbdKMLye (ORCPT + 95 others); Mon, 13 Nov 2017 06:54:34 -0500 Received: from mx2.suse.de ([195.135.220.15]:45145 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752408AbdKMLyd (ORCPT ); Mon, 13 Nov 2017 06:54:33 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id CD819ABEB; Mon, 13 Nov 2017 11:54:31 +0000 (UTC) Date: Mon, 13 Nov 2017 12:54:30 +0100 From: Michal Hocko To: Arnd Bergmann Cc: Stephen Rothwell , Andrew Morton , Linux-Next Mailing List , Linux Kernel Mailing List Subject: Re: linux-next: build warning after merge of the akpm-current tree Message-ID: <20171113115430.pms47vgz5uszqsjm@dhcp22.suse.cz> References: <20171113164206.187a790d@canb.auug.org.au> <20171113080955.zcdzx2p5kzoa4d7s@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20170609 (1.8.3) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 13-11-17 12:43:08, Arnd Bergmann wrote: > On Mon, Nov 13, 2017 at 9:09 AM, Michal Hocko wrote: > > On Mon 13-11-17 16:42:06, Stephen Rothwell wrote: > >> Hi Andrew, > >> > >> After merging the akpm-current tree, today's linux-next build (powerpc > >> ppc64_defconfig) produced this warning: > >> > >> In file included from include/linux/mmzone.h:17:0, > >> from include/linux/mempolicy.h:10, > >> from mm/mempolicy.c:70: > >> mm/mempolicy.c: In function 'mpol_to_str': > >> include/linux/nodemask.h:107:41: warning: the address of 'nodes' will always evaluate as 'true' [-Waddress] > >> #define nodemask_pr_args(maskp) (maskp) ? MAX_NUMNODES : 0, (maskp) ? (maskp)->bits : NULL > >> ^ > >> mm/mempolicy.c:2817:11: note: in expansion of macro 'nodemask_pr_args' > >> nodemask_pr_args(&nodes)); > >> ^ > > > > Hmm, this warning is quite surprising to me. Sure in this particular > > case maskp will always be non-NULL so we always expand to > > MAX_NUMNODES, maskp->bits > > which is what we want. But we have other users which may be NULL. Does > > anybody understan why this warns at all? > > As I understand it, the warning tries to address a common typo of accidentally > testing the pointer to a stack object for being non-NULL, rather than the object > pointed to for being non-zero. > > Adding an extra '!= NULL' comparison gets rid of the warning for me: > > #define nodemask_pr_args(maskp) \ > ((maskp) != NULL) ? MAX_NUMNODES : 0, \ > ((maskp) != NULL) ?(maskp)->bits : NULL OK, that is a reasonable workaround. I was talking to our gcc guy and he suggested to report a bug for this. Andrew, could you fold the explicit != NULL check into the patch please? -- Michal Hocko SUSE Labs From 1583951143469544429@xxx Mon Nov 13 11:45:23 +0000 2017 X-GM-THRID: 1583928351761700407 X-Gmail-Labels: Inbox,Category Forums,HistoricalUnread