Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp5250811rdb; Wed, 13 Dec 2023 03:35:53 -0800 (PST) X-Google-Smtp-Source: AGHT+IHod/iYS0GtUJvSLzPdkOAKDL8ez7sTAGuj+zLgWYaVMCCszare7Db5pxML3PLv9MqMNpoC X-Received: by 2002:a17:903:22c7:b0:1d0:7965:f530 with SMTP id y7-20020a17090322c700b001d07965f530mr7876330plg.88.1702467353124; Wed, 13 Dec 2023 03:35:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702467353; cv=none; d=google.com; s=arc-20160816; b=a1d4l13jG3n3zobfOGQ3DCGPfb8eZPr+hQ2ip3uWsNl+3aSpwLRfBc0J+pcP9aK7r5 fJFTZQvgDhcXY7mk1bMv5YoxTheeAF1uJkQAUZ0MCcPDr9ShxV/ibkNQKO+ut6L91STB WHK+he7xXKKyLeOQP2GYnLNTVS3VEMHbArIR87BqC0BvMDvjOB4viZ4VdpZExpF4sq7n lEa3zUYW60Z0kuYVuFA1pPe2yKbhUlktqxm+TRgo+wMcBX0Hpgtn/N7NqdBU+hudjkm/ tuX4fY5FYWc3doAkO9x6T/9fEbx7T1K2BtfNpADVCa7uJJc3a5//CNQAN5RCfHTHWqeb 152g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Y01oBBfyOPIv46mj4dR5fjPrE9RCEwPoXY62mHP0hyA=; fh=ojWWb/VwdCXC9EQKJFTmbhhlqPWqczNIQ+G4ZeF0Wwc=; b=Qn2sO74peXzOWOxhsy1XeCgc0hYf66nag5/D/+piESOCM+KzGSl6yo/PT0hfNG5/mf yaOtMeuqHMfrEEpqva3xsGJNJ94Nz5M9MV1wXSVr3yd74U4X4dpSff5GvgQtboB/49c4 palg2NOUkfQjgIMHuvnKmRX8KRjltuxqL26Fwt+4u4QGzdr+d8kmFJJYnVLc1i3AMtq3 8QR7pIJJ1UTuIa6cT4JnXTMV5i/GLnHLvQaq9vlatQAivSAFjjg+Ih6SESbEa444DxBR m7MHNl/YkxkiyCHyVIjgOSqV0n/Wkjg8jQY9H9NZD2F19b5994ZoqhMCdQmWA0deZ90s TXAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=QDOsAyXQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id c11-20020a170902d48b00b001cfb4a89e6esi9428037plg.145.2023.12.13.03.35.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Dec 2023 03:35:53 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=QDOsAyXQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 0897981823AF; Wed, 13 Dec 2023 03:35:48 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1377700AbjLMLew (ORCPT + 99 others); Wed, 13 Dec 2023 06:34:52 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38298 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1377933AbjLMLeh (ORCPT ); Wed, 13 Dec 2023 06:34:37 -0500 Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.115]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 867F3170A; Wed, 13 Dec 2023 03:33:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1702467237; x=1734003237; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=dL6Em6F9/TJ8e69UFYykBz6xgC2V73mBvEEwVDeutqU=; b=QDOsAyXQ5Xej77dKJp6uRLZZ4kqFCiXuTMkb6VT96UrH6Si8sMVRzovg gIPp6KADgdAcDNsepmRjx2fta57shXwW4VtJthCJ0o2bV7/k+mpDMvu2v llxHVJKJgt1PQoSq8mHH5y4WRc3j5IQbm0Awxqs23YuCuyqV5glqMAPOZ OBfRHuhRmlfoyYMoinXNTrcZMX78S663WBIm3yUh7suNcmTRPI1f9NktC Uc6M2dolekvYV40UCkYiqer8e1j31GBrgpTvxymM/5mEoc7mUkPHfXLbK jf5zlmlHTIJ4xoXWP9jwlwcKrvFRgwrl2V5KzwO4lxQDMu0S3+38YJyF1 Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10922"; a="394702323" X-IronPort-AV: E=Sophos;i="6.04,272,1695711600"; d="scan'208";a="394702323" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Dec 2023 03:33:10 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10922"; a="897302957" X-IronPort-AV: E=Sophos;i="6.04,272,1695711600"; d="scan'208";a="897302957" Received: from lkp-server02.sh.intel.com (HELO b07ab15da5fe) ([10.239.97.151]) by orsmga004.jf.intel.com with ESMTP; 13 Dec 2023 03:33:04 -0800 Received: from kbuild by b07ab15da5fe with local (Exim 4.96) (envelope-from ) id 1rDNU5-000KUJ-2l; Wed, 13 Dec 2023 11:33:01 +0000 Date: Wed, 13 Dec 2023 19:32:49 +0800 From: kernel test robot To: Alexander Graf , linux-kernel@vger.kernel.org Cc: oe-kbuild-all@lists.linux.dev, linux-trace-kernel@vger.kernel.org, linux-mm@kvack.org, devicetree@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kexec@lists.infradead.org, linux-doc@vger.kernel.org, x86@kernel.org, Eric Biederman , "H. Peter Anvin" , Andy Lutomirski , Rob Herring , Steven Rostedt , Andrew Morton , Mark Rutland , Tom Lendacky , Ashish Kalra , James Gowans , Stanislav Kinsburskii , arnd@arndb.de, pbonzini@redhat.com, madvenka@linux.microsoft.com, Anthony Yznaga , Usama Arif , David Woodhouse , Benjamin Herrenschmidt Subject: Re: [PATCH 02/15] memblock: Declare scratch memory as CMA Message-ID: <202312131930.gMiphjju-lkp@intel.com> References: <20231213000452.88295-3-graf@amazon.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231213000452.88295-3-graf@amazon.com> X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Wed, 13 Dec 2023 03:35:48 -0800 (PST) Hi Alexander, kernel test robot noticed the following build warnings: [auto build test WARNING on tip/x86/core] [also build test WARNING on arm64/for-next/core akpm-mm/mm-everything linus/master v6.7-rc5 next-20231213] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Alexander-Graf/mm-memblock-Add-support-for-scratch-memory/20231213-080941 base: tip/x86/core patch link: https://lore.kernel.org/r/20231213000452.88295-3-graf%40amazon.com patch subject: [PATCH 02/15] memblock: Declare scratch memory as CMA config: arc-allnoconfig (https://download.01.org/0day-ci/archive/20231213/202312131930.gMiphjju-lkp@intel.com/config) compiler: arc-elf-gcc (GCC) 13.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231213/202312131930.gMiphjju-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202312131930.gMiphjju-lkp@intel.com/ All warnings (new ones prefixed by >>): >> mm/memblock.c:2153:13: warning: 'reserve_scratch_mem' defined but not used [-Wunused-function] 2153 | static void reserve_scratch_mem(phys_addr_t start, phys_addr_t end) | ^~~~~~~~~~~~~~~~~~~ vim +/reserve_scratch_mem +2153 mm/memblock.c 2152 > 2153 static void reserve_scratch_mem(phys_addr_t start, phys_addr_t end) 2154 { 2155 #ifdef CONFIG_MEMBLOCK_SCRATCH 2156 ulong start_pfn = pageblock_start_pfn(PFN_DOWN(start)); 2157 ulong end_pfn = pageblock_align(PFN_UP(end)); 2158 ulong pfn; 2159 2160 for (pfn = start_pfn; pfn < end_pfn; pfn += pageblock_nr_pages) { 2161 /* Mark as CMA to prevent kernel allocations in it */ 2162 set_pageblock_migratetype(pfn_to_page(pfn), MIGRATE_CMA); 2163 } 2164 #endif 2165 } 2166 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki