Received: by 2002:a05:7412:b101:b0:e2:908c:2ebd with SMTP id az1csp2631054rdb; Wed, 15 Nov 2023 06:27:52 -0800 (PST) X-Google-Smtp-Source: AGHT+IENNRnR4YOLmW7Sc/7IgfIZHoSBoN53qVTNOY/czYU6u5yK4wz2N6Jm6gUjOhXJnh2m6taE X-Received: by 2002:a17:90a:1918:b0:280:3f33:64d8 with SMTP id 24-20020a17090a191800b002803f3364d8mr14947675pjg.21.1700058471847; Wed, 15 Nov 2023 06:27:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700058471; cv=none; d=google.com; s=arc-20160816; b=tnNGGq0n9qTJ9bEZ6lNsMYioltg9nj+MEfu5EabBPcdwnX+tp7ueTznWSHHi2NWTSY KZOuJfpYyaeafYfsbBuPO+2r+YZK0tkqC7ci9kOFZOKt/bbCRhU2JJt27+diNkk2zA6d SuaC5pCpQIWpq9fslVcFoNjLQX25owj/zB149nRWN1Nl2eX4WVW0lCBtSjNT+UQZs9io Sdc74y47jl9iv43hZyRJrACKDm0n8szkab9I5TXVM3C+Oirk3xtOkMeueReDOLbK5y5y qe0GTNPxhZM1WRaFNi+sKVIZtPeAmE744UhcgPSJthucEVQomRuy7VVFD24UcR3LHcff jSEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=RCIemEnKDOdZ4YaN8/XKoEqEiUJcuN3nJ7FR9qpdRaE=; fh=V9JrF5g2agrBCeQWGpOIyHZWNNprzOfGJgmYNK8cQ1U=; b=g5ED10szCJsOKz58BvKN+9HBoYpJXHmMn9J1w67dbW6nlmlp4jK1aat9u4r5bA4cVE 2++KMoYNZSRXdfxN8Oj9qhm012Vp7sJe1nitrPHKxl6MSDyUvVy5BWafjmNDLVj9bgim KxXWhk6RNR2yHzis/sfnkzfmDlQtN2Hy4zFHbsaJjgYz3bEbumiZU3DC5QyFBsK2FnTL y6VO1USfoj3GEX0ePNIfJYKiKMPiVyeORTNHHYypcLmK8JZlWoga23cKn0jck62oqiN1 1H1hyE34I3DTP5US1syZKHcxYnPJrU0fNzMtPLevYDRBFZVi8+XU7gIhh5BAmJOGYvgT dQGQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="ASgSpeI/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id oc15-20020a17090b1c0f00b00267ba1c43adsi10752420pjb.101.2023.11.15.06.27.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Nov 2023 06:27:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b="ASgSpeI/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 9C22B802AFE3; Wed, 15 Nov 2023 06:27:46 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344068AbjKOO10 (ORCPT + 99 others); Wed, 15 Nov 2023 09:27:26 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54606 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229508AbjKOO1Z (ORCPT ); Wed, 15 Nov 2023 09:27:25 -0500 Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.9]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AAB61C8; Wed, 15 Nov 2023 06:27:21 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1700058441; x=1731594441; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=bYhYhApETD3WaI4adC9XBOsh3iVZc0Tijeg2BL85FTo=; b=ASgSpeI/3ja6DmV8GPY0Nluk2a/eq1pAPz1ImfRo+epMb8AIoPz2WKq+ 6ckviktzHOAwW7zvvHCuoKsAzVeVD3OT1/RhsRCgZkd0lGsI5e8z8h6xF PljxyIrbrnsGKty7v9iwc7DiVUHZ20mD09pFfIjjZ8/URmwoKSGtWZGdE jhfSfo47AxNNXiVtKZLIKKumDmdSB/aHaGmNg5fyHD+W8wqfyRrWeCauu t7iFj+T5D9nilVulck4d09C+ZTp2mls/Zu3FzKM2guUhLMz5HpcTwsliD t/pd9O7fqcgOaA2aHj0bt81X9zXFPLrig6uUDJHe3uSWzRHT5h+jRndPQ Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10895"; a="9519395" X-IronPort-AV: E=Sophos;i="6.03,305,1694761200"; d="scan'208";a="9519395" Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by orvoesa101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Nov 2023 06:27:21 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10895"; a="768595544" X-IronPort-AV: E=Sophos;i="6.03,305,1694761200"; d="scan'208";a="768595544" Received: from lkp-server02.sh.intel.com (HELO b8de5498638e) ([10.239.97.151]) by fmsmga007.fm.intel.com with ESMTP; 15 Nov 2023 06:27:16 -0800 Received: from kbuild by b8de5498638e with local (Exim 4.96) (envelope-from ) id 1r3GrK-0000Oy-0y; Wed, 15 Nov 2023 14:27:14 +0000 Date: Wed, 15 Nov 2023 22:26:40 +0800 From: kernel test robot To: Johan Hovold , Lorenzo Pieralisi , Krzysztof =?utf-8?Q?Wilczy=C5=84ski?= , Bjorn Helgaas Cc: oe-kbuild-all@lists.linux.dev, Andy Gross , Bjorn Andersson , Konrad Dybcio , Manivannan Sadhasivam , Rob Herring , Nirmal Patel , Jonathan Derrick , linux-arm-msm@vger.kernel.org, linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, Johan Hovold , stable@vger.kernel.org, Michael Bottini , "David E . Box" Subject: Re: [PATCH 1/6] PCI/ASPM: Add locked helper for enabling link state Message-ID: <202311152225.ZdVv0ufT-lkp@intel.com> References: <20231114135553.32301-2-johan+linaro@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231114135553.32301-2-johan+linaro@kernel.org> X-Spam-Status: No, score=-1.0 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Wed, 15 Nov 2023 06:27:46 -0800 (PST) Hi Johan, kernel test robot noticed the following build warnings: [auto build test WARNING on pci/next] [also build test WARNING on pci/for-linus linus/master v6.7-rc1 next-20231115] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Johan-Hovold/PCI-ASPM-Add-locked-helper-for-enabling-link-state/20231114-220117 base: https://git.kernel.org/pub/scm/linux/kernel/git/pci/pci.git next patch link: https://lore.kernel.org/r/20231114135553.32301-2-johan%2Blinaro%40kernel.org patch subject: [PATCH 1/6] PCI/ASPM: Add locked helper for enabling link state config: x86_64-randconfig-002-20231115 (https://download.01.org/0day-ci/archive/20231115/202311152225.ZdVv0ufT-lkp@intel.com/config) compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231115/202311152225.ZdVv0ufT-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202311152225.ZdVv0ufT-lkp@intel.com/ All warnings (new ones prefixed by >>): >> drivers/pci/pcie/aspm.c:1186: warning: expecting prototype for pci_enable_link_state(). Prototype was for pci_enable_link_state_locked() instead vim +1186 drivers/pci/pcie/aspm.c 1172 1173 /** 1174 * pci_enable_link_state - Clear and set the default device link state so that 1175 * the link may be allowed to enter the specified states. Note that if the 1176 * BIOS didn't grant ASPM control to the OS, this does nothing because we can't 1177 * touch the LNKCTL register. Also note that this does not enable states 1178 * disabled by pci_disable_link_state(). Return 0 or a negative errno. 1179 * 1180 * @pdev: PCI device 1181 * @state: Mask of ASPM link states to enable 1182 * 1183 * Context: Caller holds pci_bus_sem read lock. 1184 */ 1185 int pci_enable_link_state_locked(struct pci_dev *pdev, int state) > 1186 { 1187 lockdep_assert_held_read(&pci_bus_sem); 1188 1189 return __pci_enable_link_state(pdev, state, true); 1190 } 1191 EXPORT_SYMBOL(pci_enable_link_state_locked); 1192 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki