Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp870606pxb; Fri, 22 Jan 2021 01:01:39 -0800 (PST) X-Google-Smtp-Source: ABdhPJzfSGNS1wmFfdFYq8YYYIOAm2tlSZZzKDMrIEhGymTq95O3RVxqORmYmgKKgYsWPt3BL9V3 X-Received: by 2002:a17:906:2c4e:: with SMTP id f14mr2374704ejh.432.1611306098794; Fri, 22 Jan 2021 01:01:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611306098; cv=none; d=google.com; s=arc-20160816; b=fUmBvbGsHjQf3Zy4fJN30TfwzU8Kx8+G7OFqhIbDAMr1UqzdeyWaA38dTmUweqQtvI HUQNLf0S9fB+H5x+oBtN2jIRmmo/fO9fbla0Gtjthqnyo0UWYk8sjmo5nrcahSHPHXhN IlNcx4UUY1t4seQ0lDPCCjOHxuoWIJKOSGIEJa/dJu3KkSkvd/Z4rWQX8Mh8Xoi6R3OB ZdpOGHY5Ip9S5U7PERcKB8nIs3vuYz4qDTD6QWSl8CGo0ZWfbuZOvrq6evFD2Tw2jGuE Cxhr9znupADAbJMWIs8+wWPFGWpo0DYM3mqI0XItBXpP3dol2bf2pdEZRONlOWsRw+XR opJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=EQhFCN2Qn8l2H5u/sQMBdZgZSdGwRbmb/OV0Lj4P51k=; b=R1eeMiFnDKzF0Ly9WgLmx9gNdPaM95zocnn98RwkRxpiUC9qCtzfkGNJAAESGmzLas uEcvmm78pjv04FudS7gBxg6P94OuOdwWbqjSxOvg1S0CXczcgYzqC9U+CJ+tspMhmz/N 94A/YF4kxgNwzFS3NRR+UnryM3cMzCcoX1KiI3Mo0dwGv2iBQAF3wQcmicgyC7XxjzTd Ycrjg6Ph/JM3vuBiGvLkYfbnHWuRGRx3cquJsTgJPGs/eJ6RYAY9pExxrwKeDf2ilpf2 TW2jRB3yx4TVvy7YIZqU2yoMZY/jlZmRyXmYMuCbaoZPc67VF7UhHDq/qVpeOYoPCTVU OQvg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ChvzzO2d; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cf27si3231589edb.184.2021.01.22.01.01.13; Fri, 22 Jan 2021 01:01:38 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ChvzzO2d; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727095AbhAVJAT (ORCPT + 99 others); Fri, 22 Jan 2021 04:00:19 -0500 Received: from us-smtp-delivery-124.mimecast.com ([63.128.21.124]:52130 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727257AbhAVJAO (ORCPT ); Fri, 22 Jan 2021 04:00:14 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1611305927; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=EQhFCN2Qn8l2H5u/sQMBdZgZSdGwRbmb/OV0Lj4P51k=; b=ChvzzO2ditJXecvngqjR/VXDov6OVYK6dUyirgfAFwRHtmEUYoDFWzPB4GQmSTpP0zPI0v bHKQQkITFbZqV9g3ulMqrEdkBhmejG95GY+5Bcahv8xBEskqnI97QGaPn2hVsZjnGm83NC TT2NxGn81fHYADe9QMOqrWSLt173ufE= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-426-l2SEKAn-Pz-vYTRtFcFMTw-1; Fri, 22 Jan 2021 03:58:43 -0500 X-MC-Unique: l2SEKAn-Pz-vYTRtFcFMTw-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 68C381800D41; Fri, 22 Jan 2021 08:58:42 +0000 (UTC) Received: from localhost (ovpn-12-183.pek2.redhat.com [10.72.12.183]) by smtp.corp.redhat.com (Postfix) with ESMTPS id D45CD60BF3; Fri, 22 Jan 2021 08:58:38 +0000 (UTC) Date: Fri, 22 Jan 2021 16:58:36 +0800 From: Baoquan He To: David Hildenbrand Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, akpm@linux-foundation.org, rppt@kernel.org Subject: Re: [PATCH] mm: fix prototype warning from kernel test robot Message-ID: <20210122085836.GA31398@MiWiFi-R3L-srv> References: <20210122070359.24010-1-bhe@redhat.com> <3fd62f11-bf44-3ede-aed1-10d9d4849f00@redhat.com> <20210122084659.GA29905@MiWiFi-R3L-srv> <91244046-f5a0-8e67-4c92-fe9de118e472@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <91244046-f5a0-8e67-4c92-fe9de118e472@redhat.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/22/21 at 09:55am, David Hildenbrand wrote: > On 22.01.21 09:46, Baoquan He wrote: > > On 01/22/21 at 09:40am, David Hildenbrand wrote: > >> On 22.01.21 08:03, Baoquan He wrote: > >>> Kernel test robot calling make with 'W=1' triggering warning like below > >>> below for memmap_init_zone() function. > >>> > >>> mm/page_alloc.c:6259:23: warning: no previous prototype for 'memmap_init_zone' [-Wmissing-prototypes] > >>> 6259 | void __meminit __weak memmap_init_zone(unsigned long size, int nid, > >>> | ^~~~~~~~~~~~~~~~ > >>> > >>> Fix it by adding the function declaration in include/linux/mm.h. > >>> Since memmap_init_zone() has a generic version with '__weak', > >>> the declaratoin in ia64 header file can be simply removed. > >>> > >>> Signed-off-by: Baoquan He > >>> Reported-by: kernel test robot > >>> --- > >>> arch/ia64/include/asm/pgtable.h | 5 ----- > >>> include/linux/mm.h | 1 + > >>> 2 files changed, 1 insertion(+), 5 deletions(-) > >>> > >>> diff --git a/arch/ia64/include/asm/pgtable.h b/arch/ia64/include/asm/pgtable.h > >>> index 2c81394a2430..9b4efe89e62d 100644 > >>> --- a/arch/ia64/include/asm/pgtable.h > >>> +++ b/arch/ia64/include/asm/pgtable.h > >>> @@ -517,11 +517,6 @@ extern struct page *zero_page_memmap_ptr; > >>> __changed; \ > >>> }) > >>> #endif > >>> - > >>> -# ifdef CONFIG_VIRTUAL_MEM_MAP > >>> - /* arch mem_map init routine is needed due to holes in a virtual mem_map */ > >>> - extern void memmap_init_zone(struct zone *zone); > >>> -# endif /* CONFIG_VIRTUAL_MEM_MAP */ > >>> # endif /* !__ASSEMBLY__ */ > >>> > >>> /* > >>> diff --git a/include/linux/mm.h b/include/linux/mm.h > >>> index 56bb239f9150..073049bd0b29 100644 > >>> --- a/include/linux/mm.h > >>> +++ b/include/linux/mm.h > >>> @@ -2401,6 +2401,7 @@ extern void set_dma_reserve(unsigned long new_dma_reserve); > >>> extern void memmap_init_range(unsigned long, int, unsigned long, > >>> unsigned long, unsigned long, enum meminit_context, > >>> struct vmem_altmap *, int migratetype); > >>> +extern void memmap_init_zone(struct zone *zone); > >>> extern void setup_per_zone_wmarks(void); > >>> extern int __meminit init_per_zone_wmark_min(void); > >>> extern void mem_init(void); > >>> > >> > >> This patch is on top of your other series, no? > >> > >> In -next, we have > >> > >> extern void memmap_init_zone(unsigned long, int, unsigned long, ... > >> > >> In that file, so something is wrong. > > > > Right, this one is based on the memmap_init_xx clean up patchset. I > > mentioned this the the sub-thread of kernel test robot reporting issues. > > > > I think it would make things easier to move that fix to the front and > resend the whole (5 patches) series. OK, it's fine to me, will resend a series adding this one in. I also need polish log of this patch. Thanks for looking into this.