Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3869FC61DA3 for ; Tue, 21 Feb 2023 03:59:43 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233195AbjBUD7m (ORCPT ); Mon, 20 Feb 2023 22:59:42 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58312 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229643AbjBUD7j (ORCPT ); Mon, 20 Feb 2023 22:59:39 -0500 Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 095C72597D; Mon, 20 Feb 2023 19:59:13 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1676951953; x=1708487953; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=FrNLG+QvfuWYkv9Cmz8YtxcFaAnsx1lXVXu7DFcfMr8=; b=VXs4Je6S40fpwsfG4LTTVHKGREG/VUA+Y/CwRdOrVZ1Hd1zytpkrNztM 6+fVpUMOvTlJ6RREB2QQUbGCaqVSw+a0gNSsIHPDXQZ7ZcXsobBbEiB8d qz2OKmlmgE0l7b8XuDJ9ptRixoohH2YvRUxEnHnHJE1Kclblok+lsa7Co iLrHU18F5Ya5C11RCbPK9zKP1KvXzoqkbFyfQ2dYEGfbImCS+E92zWRUK vXL9/ntza/QEANew7SIubPkrIRar96CoIvmXVOAjgEV3e5CpChIm/7Ts8 0UMabFLiyf45UwRBAO52T8qEiaf8l1ti8qwqtJqSmTK+FZzfwa+/NDyPi g==; X-IronPort-AV: E=McAfee;i="6500,9779,10627"; a="334733486" X-IronPort-AV: E=Sophos;i="5.97,314,1669104000"; d="scan'208";a="334733486" Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Feb 2023 19:58:43 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10627"; a="740253832" X-IronPort-AV: E=Sophos;i="5.97,314,1669104000"; d="scan'208";a="740253832" Received: from lkp-server01.sh.intel.com (HELO 4455601a8d94) ([10.239.97.150]) by fmsmga004.fm.intel.com with ESMTP; 20 Feb 2023 19:58:41 -0800 Received: from kbuild by 4455601a8d94 with local (Exim 4.96) (envelope-from ) id 1pUJnd-000EQ9-14; Tue, 21 Feb 2023 03:58:41 +0000 Date: Tue, 21 Feb 2023 11:58:07 +0800 From: kernel test robot To: Jeremi Piotrowski , linux-kernel@vger.kernel.org Cc: oe-kbuild-all@lists.linux.dev, Jeremi Piotrowski , netdev@vger.kernel.org, Richard Cochran , Christoph Hellwig Subject: Re: [PATCH] ptp: kvm: Use decrypted memory in confidential guest on x86 Message-ID: <202302211153.uvDZ9eZu-lkp@intel.com> References: <20230220130235.2603366-1-jpiotrowski@linux.microsoft.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230220130235.2603366-1-jpiotrowski@linux.microsoft.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Jeremi, Thank you for the patch! Perhaps something to improve: [auto build test WARNING on horms-ipvs/master] [also build test WARNING on mst-vhost/linux-next net/master net-next/master linus/master v6.2] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Jeremi-Piotrowski/ptp-kvm-Use-decrypted-memory-in-confidential-guest-on-x86/20230220-210441 base: https://git.kernel.org/pub/scm/linux/kernel/git/horms/ipvs.git master patch link: https://lore.kernel.org/r/20230220130235.2603366-1-jpiotrowski%40linux.microsoft.com patch subject: [PATCH] ptp: kvm: Use decrypted memory in confidential guest on x86 config: arm-allyesconfig (https://download.01.org/0day-ci/archive/20230221/202302211153.uvDZ9eZu-lkp@intel.com/config) compiler: arm-linux-gnueabi-gcc (GCC) 12.1.0 reproduce (this is a W=1 build): wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # https://github.com/intel-lab-lkp/linux/commit/0dd1701fd254692af3d0ca051e092e8dcef190c4 git remote add linux-review https://github.com/intel-lab-lkp/linux git fetch --no-tags linux-review Jeremi-Piotrowski/ptp-kvm-Use-decrypted-memory-in-confidential-guest-on-x86/20230220-210441 git checkout 0dd1701fd254692af3d0ca051e092e8dcef190c4 # save the config file mkdir build_dir && cp config build_dir/.config COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-12.1.0 make.cross W=1 O=build_dir ARCH=arm olddefconfig COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-12.1.0 make.cross W=1 O=build_dir ARCH=arm SHELL=/bin/bash drivers/ptp/ If you fix the issue, kindly add following tag where applicable | Reported-by: kernel test robot | Link: https://lore.kernel.org/oe-kbuild-all/202302211153.uvDZ9eZu-lkp@intel.com/ All warnings (new ones prefixed by >>): >> drivers/ptp/ptp_kvm_arm.c:25:6: warning: no previous prototype for 'kvm_arch_ptp_exit' [-Wmissing-prototypes] 25 | void kvm_arch_ptp_exit(void) | ^~~~~~~~~~~~~~~~~ vim +/kvm_arch_ptp_exit +25 drivers/ptp/ptp_kvm_arm.c 24 > 25 void kvm_arch_ptp_exit(void) 26 { 27 } 28 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests