Received: by 2002:a19:f614:0:0:0:0:0 with SMTP id x20csp56842lfe; Fri, 15 Apr 2022 19:18:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwUDyXOjhJqrtLozNWhiGMA6jhUfEkBU8GPxYzBry4JkOnWn1P5Okavt2d36IH8Kdk+X4zV X-Received: by 2002:a05:6a00:1907:b0:4f7:945:14cf with SMTP id y7-20020a056a00190700b004f7094514cfmr1674729pfi.47.1650075514747; Fri, 15 Apr 2022 19:18:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650075514; cv=none; d=google.com; s=arc-20160816; b=szu7mpTfsr/KJTfQhxICpjwPx9u88LqYYiA1C7RDZXcFAY3yOZoXJpwcbDjx2fsq19 bnOEhhP++c2S7PumrE4EVviHnzyY9tlDEX7I/sgq0U1QoJPeqMoLSTb95+gO6ji2RmCE 9WgLUBDhfFUCqfW7cPVBw1A1WqoHWkGrlU2ptaVCZ7DZlIG/f70ffkHAVxorNTSeGpXI iSKS0UqFDoIEXmjR31VeyBh/itHnwetSu6ya/1tnMKwJDrWTUQLwA37ZPQDvc35zKLqx xC0/R2P8ZqNWr/VGuwtg1PhsclDdxq1f0qZJk/Pl3sXqF/rpecYsdqCk0J0/OFnVJ903 7WwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=diSDNzq3ofVgpDCiHM0MI8ihwov+aYsXyjS5ioamce8=; b=nVVGg1BNBEJXV8s37E59giij830JWeua8unV5tc4V8YHs3b+oAQc9dh2V7xCU95IZs dbrCKhih51rhq0ER0sj3zTFklvLWzQ4TeK7IQL1kBT1TNt2aeQTyNr5aN6ujNZctegiG W8bToDdCWpOAqZOF6eX00mW2PkrM9MIq6SspcrGRBGkVDfTcmn9YGW9vkJX07Kt/NE/7 SpTq5+cWTV6hxNbpIci4ZS2rgK8LzkwOf3g6md+x9eyikDpon40NiS9GAmIjTHDbabVn DUFssNAxh4I16Al4QhwA1IumcgrKhNKA3OGE/d8mbJ7gsTMpY18zZV8ypquli22AN3Xg /2Ww== ARC-Authentication-Results: i=1; mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id s18-20020a056a00195200b00505b033e35fsi3127834pfk.71.2022.04.15.19.18.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Apr 2022 19:18:34 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id BF63D121538; Fri, 15 Apr 2022 18:34:36 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239076AbiDMXK1 (ORCPT + 99 others); Wed, 13 Apr 2022 19:10:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59454 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232204AbiDMXKX (ORCPT ); Wed, 13 Apr 2022 19:10:23 -0400 Received: from www62.your-server.de (www62.your-server.de [213.133.104.62]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9AE2B25C4C for ; Wed, 13 Apr 2022 16:08:00 -0700 (PDT) Received: from sslproxy02.your-server.de ([78.47.166.47]) by www62.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92.3) (envelope-from ) id 1nelpW-0002n1-Cw; Thu, 14 Apr 2022 00:51:18 +0200 Received: from [85.1.206.226] (helo=linux.home) by sslproxy02.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1nelpW-000AyP-7e; Thu, 14 Apr 2022 00:51:18 +0200 Subject: Re: [ammarfaizi2-block:bpf/bpf-next/pr/bpf-sysctl 1/1] kernel/bpf/syscall.c:4944:13: warning: no previous prototype for 'unpriv_ebpf_notify' To: kernel test robot , Yan Zhu Cc: kbuild-all@lists.01.org, GNU/Weeb Mailing List , linux-kernel@vger.kernel.org References: <202204140614.Tt9e1fIt-lkp@intel.com> From: Daniel Borkmann Message-ID: Date: Thu, 14 Apr 2022 00:51:17 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <202204140614.Tt9e1fIt-lkp@intel.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.103.5/26511/Wed Apr 13 10:22:45 2022) X-Spam-Status: No, score=-5.7 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,NICE_REPLY_A, RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/14/22 12:42 AM, kernel test robot wrote: > tree: https://github.com/ammarfaizi2/linux-block bpf/bpf-next/pr/bpf-sysctl > head: 2900005ea287b11dcc8c1b9fcf24893b7ff41d6d > commit: 2900005ea287b11dcc8c1b9fcf24893b7ff41d6d [1/1] bpf: Move BPF sysctls from kernel/sysctl.c to BPF core > config: sh-buildonly-randconfig-r001-20220413 (https://download.01.org/0day-ci/archive/20220414/202204140614.Tt9e1fIt-lkp@intel.com/config) > compiler: sh4-linux-gcc (GCC) 11.2.0 > reproduce (this is a W=1 build): > wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross > chmod +x ~/bin/make.cross > # https://github.com/ammarfaizi2/linux-block/commit/2900005ea287b11dcc8c1b9fcf24893b7ff41d6d > git remote add ammarfaizi2-block https://github.com/ammarfaizi2/linux-block > git fetch --no-tags ammarfaizi2-block bpf/bpf-next/pr/bpf-sysctl > git checkout 2900005ea287b11dcc8c1b9fcf24893b7ff41d6d > # save the config file to linux build tree > mkdir build_dir > COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-11.2.0 make.cross O=build_dir ARCH=sh SHELL=/bin/bash > > If you fix the issue, kindly add following tag as appropriate > Reported-by: kernel test robot > > All error/warnings (new ones prefixed by >>): > > sh4-linux-ld: arch/sh/lib/mcount.o: in function `stack_panic': >>> (.text+0x50): undefined reference to `dump_stack' > -- >>> kernel/bpf/syscall.c:4944:13: warning: no previous prototype for 'unpriv_ebpf_notify' [-Wmissing-prototypes] > 4944 | void __weak unpriv_ebpf_notify(int new_state) > | ^~~~~~~~~~~~~~~~~~ > > > vim +/unpriv_ebpf_notify +4944 kernel/bpf/syscall.c > > 4943 >> 4944 void __weak unpriv_ebpf_notify(int new_state) > 4945 { > 4946 } > 4947 > (Note that this is no different than the way it was before wrt prototype.)