Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp868892pxb; Fri, 22 Jan 2021 00:58:34 -0800 (PST) X-Google-Smtp-Source: ABdhPJwXj7JYua9gfYyZ6Yrww+j55v989DlFe+eOkWK2XdGSvIKUJ5+3HkHidKBcGEqK0aGaT9dM X-Received: by 2002:a17:906:f98f:: with SMTP id li15mr135147ejb.123.1611305914049; Fri, 22 Jan 2021 00:58:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611305914; cv=none; d=google.com; s=arc-20160816; b=O2b+oM+ffy/66uXnySfGFZvzuMVqncrgQ6v+SEMpCt14ri5aDSbYHFD4mR+QTUAAPl QT7jVTcDN7Ho6QvLD7be8Rev489INsKxOQMINkV7UQO2bwQBdHuDtNhoS2opE6x50hFe UTG3lQZGPvBLQSAnO99l6jQz7i0JQGIeeqVWyNL8sgi7rqm7jJNzmU2WoDWXslHxKMGu QCM+QLOrjQeCY+V8F5xRxR4Qne5uMZ5mEYZeA/mw8q8J28vmhM/QPPp7LEYgd7kk6q7B i5A0Lhaiol04cFsnNxsff18aSZDcLxwI+liVxBp39V+huNXgSUrvtBcxpOA45GNelQoL B3FQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:organization :from:references:cc:to:subject:dkim-signature; bh=fvHl3O68MiCuuLrlkudPi9oW/WlonEmOG7Xui3F/vQ4=; b=zH3JRkkpS78l9Sr+zw8y2kB4DJkD0YWLW022bL318TkotFVNA24fwzO5OqhTktb+eo at40aZE5S2xk2a0RclN+Gdp+upJu8vqOQUealBagS4bucUm8p0VMxnyDAgMfmxgIZPIQ sSKIDqD0BCF+b6nWsLo/DXE+A3LM5MbBTrw1MeqIF2l28BKUylE+inrRtca88E/XcW9F n2geBtjDCPCUpt/PKYvadcJE7X5kwpBbaSeZrRXHRCnSPiGxnXqMP9JcD0YfYuw/XoMv 2Y0usfY0Rieer7VVfqQHC5tIPmJH4rkdyqNXat9HglUZtXLTxB3O5yP69nZeFv+r4WQh rgVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=DazcVefr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b13si1868957ejc.561.2021.01.22.00.58.10; Fri, 22 Jan 2021 00:58:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=DazcVefr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727196AbhAVI50 (ORCPT + 99 others); Fri, 22 Jan 2021 03:57:26 -0500 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:38501 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727156AbhAVI5C (ORCPT ); Fri, 22 Jan 2021 03:57:02 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1611305730; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=fvHl3O68MiCuuLrlkudPi9oW/WlonEmOG7Xui3F/vQ4=; b=DazcVefrwHXaxEAdpgi5i1a9vJbrwi5Wm+7M1IT3a0PA3Pdd4Mr4NNT/k1ahOptaQWMJlA DjfrpXmZvcSYUaVc+O8AQFp827P/9XTvy6ql5rPRCJDN+buZAhhqRYfmyanJO0nRX8RaDb 8MeG/GwGkaSMPNCtqnCM/mxP6asEhiE= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-340-_U7CnJoKPbqkfFoUJBzZvg-1; Fri, 22 Jan 2021 03:55:27 -0500 X-MC-Unique: _U7CnJoKPbqkfFoUJBzZvg-1 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 735E610054FF; Fri, 22 Jan 2021 08:55:26 +0000 (UTC) Received: from [10.36.114.142] (ovpn-114-142.ams2.redhat.com [10.36.114.142]) by smtp.corp.redhat.com (Postfix) with ESMTP id 6A577709AE; Fri, 22 Jan 2021 08:55:25 +0000 (UTC) Subject: Re: [PATCH] mm: fix prototype warning from kernel test robot To: Baoquan He Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, akpm@linux-foundation.org, rppt@kernel.org References: <20210122070359.24010-1-bhe@redhat.com> <3fd62f11-bf44-3ede-aed1-10d9d4849f00@redhat.com> <20210122084659.GA29905@MiWiFi-R3L-srv> From: David Hildenbrand Organization: Red Hat GmbH Message-ID: <91244046-f5a0-8e67-4c92-fe9de118e472@redhat.com> Date: Fri, 22 Jan 2021 09:55:24 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.5.0 MIME-Version: 1.0 In-Reply-To: <20210122084659.GA29905@MiWiFi-R3L-srv> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 22.01.21 09:46, Baoquan He wrote: > On 01/22/21 at 09:40am, David Hildenbrand wrote: >> On 22.01.21 08:03, Baoquan He wrote: >>> Kernel test robot calling make with 'W=1' triggering warning like below >>> below for memmap_init_zone() function. >>> >>> mm/page_alloc.c:6259:23: warning: no previous prototype for 'memmap_init_zone' [-Wmissing-prototypes] >>> 6259 | void __meminit __weak memmap_init_zone(unsigned long size, int nid, >>> | ^~~~~~~~~~~~~~~~ >>> >>> Fix it by adding the function declaration in include/linux/mm.h. >>> Since memmap_init_zone() has a generic version with '__weak', >>> the declaratoin in ia64 header file can be simply removed. >>> >>> Signed-off-by: Baoquan He >>> Reported-by: kernel test robot >>> --- >>> arch/ia64/include/asm/pgtable.h | 5 ----- >>> include/linux/mm.h | 1 + >>> 2 files changed, 1 insertion(+), 5 deletions(-) >>> >>> diff --git a/arch/ia64/include/asm/pgtable.h b/arch/ia64/include/asm/pgtable.h >>> index 2c81394a2430..9b4efe89e62d 100644 >>> --- a/arch/ia64/include/asm/pgtable.h >>> +++ b/arch/ia64/include/asm/pgtable.h >>> @@ -517,11 +517,6 @@ extern struct page *zero_page_memmap_ptr; >>> __changed; \ >>> }) >>> #endif >>> - >>> -# ifdef CONFIG_VIRTUAL_MEM_MAP >>> - /* arch mem_map init routine is needed due to holes in a virtual mem_map */ >>> - extern void memmap_init_zone(struct zone *zone); >>> -# endif /* CONFIG_VIRTUAL_MEM_MAP */ >>> # endif /* !__ASSEMBLY__ */ >>> >>> /* >>> diff --git a/include/linux/mm.h b/include/linux/mm.h >>> index 56bb239f9150..073049bd0b29 100644 >>> --- a/include/linux/mm.h >>> +++ b/include/linux/mm.h >>> @@ -2401,6 +2401,7 @@ extern void set_dma_reserve(unsigned long new_dma_reserve); >>> extern void memmap_init_range(unsigned long, int, unsigned long, >>> unsigned long, unsigned long, enum meminit_context, >>> struct vmem_altmap *, int migratetype); >>> +extern void memmap_init_zone(struct zone *zone); >>> extern void setup_per_zone_wmarks(void); >>> extern int __meminit init_per_zone_wmark_min(void); >>> extern void mem_init(void); >>> >> >> This patch is on top of your other series, no? >> >> In -next, we have >> >> extern void memmap_init_zone(unsigned long, int, unsigned long, ... >> >> In that file, so something is wrong. > > Right, this one is based on the memmap_init_xx clean up patchset. I > mentioned this the the sub-thread of kernel test robot reporting issues. > I think it would make things easier to move that fix to the front and resend the whole (5 patches) series. -- Thanks, David / dhildenb