Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp5320903rdb; Wed, 13 Dec 2023 05:41:39 -0800 (PST) X-Google-Smtp-Source: AGHT+IEicNE0mZQksvXCpM0hjO+Q1kI305RnKhPkOUA8Wc3MZBVWhzihWfUzBKr0aDzVzBtKmUlx X-Received: by 2002:a05:6a00:2349:b0:6cd:a145:6703 with SMTP id j9-20020a056a00234900b006cda1456703mr3480367pfj.2.1702474898907; Wed, 13 Dec 2023 05:41:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702474898; cv=none; d=google.com; s=arc-20160816; b=WOUp9zZwk7m5qm5rKGxFCSlyqXteFpGlGxgg9fENzeOjkyFF6Fum+KnlM+Ouc3wiHX BJ6ICzuV266IQu5Rp11XACacvbq32dkcpa2mahifP9vGBO2gdaO0NqsCfhs55uXAcrRX GggXFc5OvN1TJGugxkAF51hlKLYZCt6vo3El/lAfA7ZGbS+Tk5LqIzrWaoXkUyd+lekr sUNINBgWQJmDay2aXePrUsV4P12cFsBjHSBN9PyxmH/GYXcTaQwr7WBB2usSQFdcL872 vFIlxRFv5F8P/vcB9oLdqws4hNnEIkyU9X9ewbeOqHKuxX6bu5pHz8uYuhEcFWrP20vK AQEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=r+kGXYnfRsrq6/F3Gy5zhOlgISUpY31FCQQPoyx3GxU=; fh=SnDGqvOvndnUwwoDcp3Yw/nyDVVJ91zFbw9YQlufUsw=; b=J7RXpnlTYSJRrOMeq6XttpJDlZswooVSrg4DSvzvxv+mhcsLunEF6OiQDmmKdrzTEF yNvunavHkYAAAYfJap58K74/+pO4qFjaw5AzWm67sF4op5d1UMSl2q+8t0uhFlYtN9yl hmXCUYwrFHtLbCFE4uBvhOjheAF944SbtS+thGxv7tD9NDONNxU1lch+r6NXrO5bAW7S xLtr06oZbjs7/S95eWXjyJJyuM9htEu7ftg1H5ttIKix69KdXXhWXoNGvS32NfB9xb8m rRr/F6uDsAGYzppkdPdHUcMg94LXndwFXaNQCyk7r4b+qj6ZAzNyIxD54QV+Y0FzDVXJ GS8A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=PeNtitCG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id n2-20020a632702000000b00578b63123desi9477436pgn.789.2023.12.13.05.41.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Dec 2023 05:41:38 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=PeNtitCG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id 68A5682217B6; Wed, 13 Dec 2023 05:41:36 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233655AbjLMNlW (ORCPT + 99 others); Wed, 13 Dec 2023 08:41:22 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44828 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233465AbjLMNlU (ORCPT ); Wed, 13 Dec 2023 08:41:20 -0500 Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.100]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D310BF5; Wed, 13 Dec 2023 05:41:24 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1702474884; x=1734010884; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=UHu+07MBRevDOSW1Tf5iIKC4rfKnsAW4POR/WWx6Gr0=; b=PeNtitCGHo6Z2DxOgHaRJwMCX92KgQ8uTtXwWfm0S4XQnWdi+sOyD1Sx JdwaQqEn5PQ+OAYsVTm2xWxEL6YYBH+H9dATGqP2eObOumQ5Ll7m0kWyi VvP6ZdyTQPFwyKumVwaBd+XfSxXiw4AmyYBoWO+xMqGsOkft6mIOXHXig gMxRLNIerquzOzFZbIGbDAewSWc9I7qA+3pMh40oh/jlKj3kxLiDLAUmn j1JqT5OhhqNEyZvfwx75VDmCebcSuM3LH1DmNjlk4zMwoEj4URqQigLSM 4DLI3aVoIJiX+In3OZalr1Gh1RKRAl2LPLZlCaaiV3J8egsuL10FotVw6 w==; X-IronPort-AV: E=McAfee;i="6600,9927,10922"; a="461439317" X-IronPort-AV: E=Sophos;i="6.04,272,1695711600"; d="scan'208";a="461439317" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Dec 2023 05:41:24 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10922"; a="892023724" X-IronPort-AV: E=Sophos;i="6.04,272,1695711600"; d="scan'208";a="892023724" Received: from lkp-server02.sh.intel.com (HELO b07ab15da5fe) ([10.239.97.151]) by fmsmga002.fm.intel.com with ESMTP; 13 Dec 2023 05:41:17 -0800 Received: from kbuild by b07ab15da5fe with local (Exim 4.96) (envelope-from ) id 1rDPUB-000Kcx-1a; Wed, 13 Dec 2023 13:41:15 +0000 Date: Wed, 13 Dec 2023 21:41:10 +0800 From: kernel test robot To: Alexander Graf , linux-kernel@vger.kernel.org Cc: oe-kbuild-all@lists.linux.dev, linux-trace-kernel@vger.kernel.org, linux-mm@kvack.org, devicetree@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kexec@lists.infradead.org, linux-doc@vger.kernel.org, x86@kernel.org, Eric Biederman , "H. Peter Anvin" , Andy Lutomirski , Peter Zijlstra , Rob Herring , Steven Rostedt , Andrew Morton , Mark Rutland , Tom Lendacky , Ashish Kalra , James Gowans , Stanislav Kinsburskii , arnd@arndb.de, pbonzini@redhat.com, madvenka@linux.microsoft.com, Anthony Yznaga , Usama Arif , David Woodhouse , Benjamin Herrenschmidt Subject: Re: [PATCH 06/15] arm64: Add KHO support Message-ID: <202312132139.g2NKV67G-lkp@intel.com> References: <20231213000452.88295-7-graf@amazon.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231213000452.88295-7-graf@amazon.com> X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Wed, 13 Dec 2023 05:41:36 -0800 (PST) Hi Alexander, kernel test robot noticed the following build warnings: [auto build test WARNING on tip/x86/core] [also build test WARNING on arm64/for-next/core akpm-mm/mm-everything linus/master v6.7-rc5 next-20231213] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Alexander-Graf/mm-memblock-Add-support-for-scratch-memory/20231213-080941 base: tip/x86/core patch link: https://lore.kernel.org/r/20231213000452.88295-7-graf%40amazon.com patch subject: [PATCH 06/15] arm64: Add KHO support config: microblaze-randconfig-r133-20231213 (https://download.01.org/0day-ci/archive/20231213/202312132139.g2NKV67G-lkp@intel.com/config) compiler: microblaze-linux-gcc (GCC) 13.2.0 reproduce: (https://download.01.org/0day-ci/archive/20231213/202312132139.g2NKV67G-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202312132139.g2NKV67G-lkp@intel.com/ sparse warnings: (new ones prefixed by >>) >> drivers/of/fdt.c:1012:13: sparse: sparse: symbol 'early_init_dt_check_kho' was not declared. Should it be static? vim +/early_init_dt_check_kho +1012 drivers/of/fdt.c 1008 1009 /** 1010 * early_init_dt_check_kho - Decode info required for kexec handover from DT 1011 */ > 1012 void __init early_init_dt_check_kho(void) 1013 { 1014 #ifdef CONFIG_KEXEC_KHO 1015 unsigned long node = chosen_node_offset; 1016 u64 kho_start, scratch_start, scratch_size, mem_start, mem_size; 1017 const __be32 *p; 1018 int l; 1019 1020 if ((long)node < 0) 1021 return; 1022 1023 p = of_get_flat_dt_prop(node, "linux,kho-dt", &l); 1024 if (l != (dt_root_addr_cells + dt_root_size_cells) * sizeof(__be32)) 1025 return; 1026 1027 kho_start = dt_mem_next_cell(dt_root_addr_cells, &p); 1028 1029 p = of_get_flat_dt_prop(node, "linux,kho-scratch", &l); 1030 if (l != (dt_root_addr_cells + dt_root_size_cells) * sizeof(__be32)) 1031 return; 1032 1033 scratch_start = dt_mem_next_cell(dt_root_addr_cells, &p); 1034 scratch_size = dt_mem_next_cell(dt_root_addr_cells, &p); 1035 1036 p = of_get_flat_dt_prop(node, "linux,kho-mem", &l); 1037 if (l != (dt_root_addr_cells + dt_root_size_cells) * sizeof(__be32)) 1038 return; 1039 1040 mem_start = dt_mem_next_cell(dt_root_addr_cells, &p); 1041 mem_size = dt_mem_next_cell(dt_root_addr_cells, &p); 1042 1043 kho_populate(kho_start, scratch_start, scratch_size, mem_start, mem_size); 1044 #endif 1045 } 1046 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki