From patchwork Mon Dec 23 14:19:29 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Niklas Cassel X-Patchwork-Id: 11308343 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 4F1BA13A4 for ; Mon, 23 Dec 2019 14:20:32 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 014D921569 for ; Mon, 23 Dec 2019 14:20:31 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=flawful.org header.i=@flawful.org header.b="E+AB4TDP" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726828AbfLWOUb (ORCPT ); Mon, 23 Dec 2019 09:20:31 -0500 Received: from ste-pvt-msa2.bahnhof.se ([213.80.101.71]:42799 "EHLO ste-pvt-msa2.bahnhof.se" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726763AbfLWOUb (ORCPT ); Mon, 23 Dec 2019 09:20:31 -0500 Received: from localhost (localhost [127.0.0.1]) by ste-pvt-msa2.bahnhof.se (Postfix) with ESMTP id 81E823FF88; Mon, 23 Dec 2019 15:20:27 +0100 (CET) Authentication-Results: ste-pvt-msa2.bahnhof.se; dkim=pass (1024-bit key; unprotected) header.d=flawful.org header.i=@flawful.org header.b=E+AB4TDP; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at bahnhof.se X-Spam-Flag: NO X-Spam-Score: -2.099 X-Spam-Level: X-Spam-Status: No, score=-2.099 tagged_above=-999 required=6.31 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ste-ftg-msa2.bahnhof.se (amavisd-new); dkim=pass (1024-bit key) header.d=flawful.org Received: from ste-pvt-msa2.bahnhof.se ([127.0.0.1]) by localhost (ste-ftg-msa2.bahnhof.se [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JoEtkJlzAztB; Mon, 23 Dec 2019 15:20:26 +0100 (CET) Received: from flawful.org (ua-84-217-220-205.bbcust.telenor.se [84.217.220.205]) (Authenticated sender: mb274189) by ste-pvt-msa2.bahnhof.se (Postfix) with ESMTPA id A101A3FF7F; Mon, 23 Dec 2019 15:20:25 +0100 (CET) Received: by flawful.org (Postfix, from userid 1001) id 261241496; Mon, 23 Dec 2019 15:20:24 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=flawful.org; s=mail; t=1577110825; bh=YctLqQstM2RVCMZgTLiBTPIfDGVU6P21oJ4N0sJMepc=; h=From:To:Cc:Subject:Date:From; b=E+AB4TDPWHTerlPCA3RLFixjE89ykQIfqRO2IolXSuzVRZARtea6k5gzhrtpjZtfg hzmRy7HVy1iQIBzDQ2fv79FL+OSMiMDu/WRiF3HLt5uWhaPfM0H8WK2O1dX/UBqMCJ xAf8+JHhD2FmIAhQAaMzhoLwoAwKp1UGFMkIuruY= From: Niklas Cassel To: "Rafael J . Wysocki" Cc: linux-pm@vger.kernel.org, linux-arm-msm@vger.kernel.org, Niklas Cassel Subject: [PATCH 0/5] qcom-cpr fixes for rjw bleeding-edge Date: Mon, 23 Dec 2019 15:19:29 +0100 Message-Id: <20191223141934.19837-1-nks@flawful.org> X-Mailer: git-send-email 2.11.0 MIME-Version: 1.0 Sender: linux-arm-msm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-arm-msm@vger.kernel.org Hello Rafael, Here comes some bug fixes for qcom-cpr that were detected once the driver got some more build testing. Patches 1-2 fix warnings detected by the intel test robot. Patch 3 fixes an error I detected when doing an allnoconfig and enabling simply the qcom-cpr driver. Patches 4-5 are only detected when building with W=1. However, I decided to fix these as well, in order to hopefully avoid any further build test reports. The series is based on your bleeding-edge branch. Feel free to squash them with the existing commit if you so desire. Niklas Cassel (5): power: avs: qcom-cpr: fix invalid printk specifier in debug print power: avs: qcom-cpr: fix unsigned expression compared with zero power: avs: qcom-cpr: make sure that regmap is available power: avs: qcom-cpr: remove set but unused variable power: avs: qcom-cpr: make cpr_get_opp_hz_for_req() static drivers/power/avs/Kconfig | 1 + drivers/power/avs/qcom-cpr.c | 18 ++++++++++-------- 2 files changed, 11 insertions(+), 8 deletions(-)