Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp1738636rwb; Thu, 19 Jan 2023 14:59:20 -0800 (PST) X-Google-Smtp-Source: AMrXdXtcNLxHxYYZyaScjdPLhhalUJDHKVHXT94Wgwwzra+b2ql1vggoEnLsIc33k6ZdjU5l+B+l X-Received: by 2002:a17:90a:d344:b0:229:ef6c:4139 with SMTP id i4-20020a17090ad34400b00229ef6c4139mr2973695pjx.22.1674169159906; Thu, 19 Jan 2023 14:59:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674169159; cv=none; d=google.com; s=arc-20160816; b=pr91synC0LXEcrnvJP3GF2OX0xu6S+ogtIITEq3zvSjdr6wCAT2zIJRMldzq99WOK5 FitV8V9+i1e/Dws3ZSobGPy5KKkyc8v7p6AQn/YmNpe/Knl47Q0iAMFkxhq5WG/RHHtJ h5vmwCI6kB0sJFkAQDthjS3KPpvBG/MM/PlWfFkqWzCzoRTSBB9InJGoLnd9jVGwXZSY y01axFncglIW07Blm6QUM7f5E9EnSD2VRWFTN1ys5Vp4g0shU5HBsRcBUMBcHISmKsE8 P8gOECb41qYrcOT0ikRvpHHmrIE169wq+nPtCTSIoUdiAGOtLNwBpaZL+EqyA13r900o vWbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=kWQ9hWtHqXu32b/Eg1rEeErEyD6D4AAOvC+Ua7xNxKo=; b=0951Vsk6LXbc2WGBlGiWZlhV5ZBDOKktwbbTOgfGQXIys8PKF8tQ7txk7nigJI/NX+ +2FVVm9TrELxKJQ2qKSG5hUj2NAdtXo8WC3XO4iAHqzQcc7AOCm7EW+mxvfDUVmLS1HB fz6oKfz9D4afxeUdzPj6WAfDv655omClaDnVEcZteLhQI2kdDkpi6epWf5muVU9ZmuEq oDsc2PaVj0vhyWf2etBXszUNWAkwp5WO4ivZZr6Pkv/RD3MsFdrT2Jyw2zNwiObGkGAi RQqf/RygzOu8bhYFZyNcKo9sdjEz39zG+4kwdixfWZKps6CgPW64jeeXwm3V7OIEFDAc 6VyA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=oArC4bfc; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m14-20020a17090a5a4e00b00225ca23faddsi565464pji.54.2023.01.19.14.59.02; Thu, 19 Jan 2023 14:59:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=oArC4bfc; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229779AbjASWuA (ORCPT + 99 others); Thu, 19 Jan 2023 17:50:00 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43652 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230350AbjASWtY (ORCPT ); Thu, 19 Jan 2023 17:49:24 -0500 Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 556EB2135; Thu, 19 Jan 2023 14:32:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1674167555; x=1705703555; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=JoJGpj8vaP9dF2CWcRmJfrTrGxAvkWjp3W42IgzKc3E=; b=oArC4bfcDJvjIAZZWuq/gP0twfANd68b+/1bZrB/rrZfWittmur8+o88 uWmDg8GoQ6VGMhVQpdSuv8OieZNQa0hsYmbtv+pn7qM/tFXwdMcZi43rf 8l0/Qd/xn/hFacrDPX5jLE9Fjg7k9vIB9PoAVo2AoS9UxBtkdiXHqsShy B1LgEBgFI2+SaqQMw9Q0POkBwCGnzA3e7BZSJ3jipNLCZi36DgYMBprVx k8fyIEE6o0WVzuW/3em6DTiygyT7zqFqfumpAywhn8Cs5C6tTV+0qEH4w teAcIsCkUauQWlWGI2bAE34UF3Cm0hyJ7yx3AZ2Zs7YiefqW00B3/zCp7 w==; X-IronPort-AV: E=McAfee;i="6500,9779,10595"; a="389965184" X-IronPort-AV: E=Sophos;i="5.97,230,1669104000"; d="scan'208";a="389965184" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Jan 2023 14:31:30 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10595"; a="768410237" X-IronPort-AV: E=Sophos;i="5.97,230,1669104000"; d="scan'208";a="768410237" Received: from lkp-server01.sh.intel.com (HELO 5646d64e7320) ([10.239.97.150]) by fmsmga002.fm.intel.com with ESMTP; 19 Jan 2023 14:31:26 -0800 Received: from kbuild by 5646d64e7320 with local (Exim 4.96) (envelope-from ) id 1pIdRN-0001uq-2N; Thu, 19 Jan 2023 22:31:25 +0000 Date: Fri, 20 Jan 2023 06:31:05 +0800 From: kernel test robot To: Babis Chalios , Olivia Mackall , Herbert Xu , "Michael S. Tsirkin" , Jason Wang , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, virtualization@lists.linux-foundation.org Cc: oe-kbuild-all@lists.linux.dev, amit@kernel.org, graf@amazon.de, Jason@zx2c4.com, xmarcalx@amazon.co.uk Subject: Re: [PATCH 2/2] virtio-rng: add sysfs entries for leak detection Message-ID: <202301200640.CsblwTsa-lkp@intel.com> References: <20230119184349.74072-3-bchalios@amazon.es> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230119184349.74072-3-bchalios@amazon.es> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi Babis, Thank you for the patch! Perhaps something to improve: [auto build test WARNING on char-misc/char-misc-testing] [also build test WARNING on char-misc/char-misc-next char-misc/char-misc-linus linus/master v6.2-rc4 next-20230119] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Babis-Chalios/virtio-rng-implement-entropy-leak-feature/20230120-024631 patch link: https://lore.kernel.org/r/20230119184349.74072-3-bchalios%40amazon.es patch subject: [PATCH 2/2] virtio-rng: add sysfs entries for leak detection config: m68k-allyesconfig (https://download.01.org/0day-ci/archive/20230120/202301200640.CsblwTsa-lkp@intel.com/config) compiler: m68k-linux-gcc (GCC) 12.1.0 reproduce (this is a W=1 build): wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # https://github.com/intel-lab-lkp/linux/commit/2a801d93b8225555e4cb293a173e2053870cb2d1 git remote add linux-review https://github.com/intel-lab-lkp/linux git fetch --no-tags linux-review Babis-Chalios/virtio-rng-implement-entropy-leak-feature/20230120-024631 git checkout 2a801d93b8225555e4cb293a173e2053870cb2d1 # save the config file mkdir build_dir && cp config build_dir/.config COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-12.1.0 make.cross W=1 O=build_dir ARCH=m68k olddefconfig COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-12.1.0 make.cross W=1 O=build_dir ARCH=m68k SHELL=/bin/bash drivers/char/ If you fix the issue, kindly add following tag where applicable | Reported-by: kernel test robot All warnings (new ones prefixed by >>): >> drivers/char/hw_random/virtio-rng.c:61:9: warning: no previous prototype for 'virtrng_sysfs_read' [-Wmissing-prototypes] 61 | ssize_t virtrng_sysfs_read(struct file *filep, struct kobject *kobj, | ^~~~~~~~~~~~~~~~~~ >> drivers/char/hw_random/virtio-rng.c:76:5: warning: no previous prototype for 'virtrng_sysfs_mmap' [-Wmissing-prototypes] 76 | int virtrng_sysfs_mmap(struct file *filep, struct kobject *kobj, | ^~~~~~~~~~~~~~~~~~ drivers/char/hw_random/virtio-rng.c:106:5: warning: no previous prototype for 'add_fill_on_leak_request' [-Wmissing-prototypes] 106 | int add_fill_on_leak_request(struct virtrng_info *vi, struct virtqueue *vq, void *data, size_t len) | ^~~~~~~~~~~~~~~~~~~~~~~~ drivers/char/hw_random/virtio-rng.c:120:5: warning: no previous prototype for 'virtrng_fill_on_leak' [-Wmissing-prototypes] 120 | int virtrng_fill_on_leak(struct virtrng_info *vi, void *data, size_t len) | ^~~~~~~~~~~~~~~~~~~~ drivers/char/hw_random/virtio-rng.c:141:5: warning: no previous prototype for 'add_copy_on_leak_request' [-Wmissing-prototypes] 141 | int add_copy_on_leak_request(struct virtrng_info *vi, struct virtqueue *vq, | ^~~~~~~~~~~~~~~~~~~~~~~~ drivers/char/hw_random/virtio-rng.c:160:5: warning: no previous prototype for 'virtrng_copy_on_leak' [-Wmissing-prototypes] 160 | int virtrng_copy_on_leak(struct virtrng_info *vi, void *to, void *from, size_t len) | ^~~~~~~~~~~~~~~~~~~~ vim +/virtrng_sysfs_read +61 drivers/char/hw_random/virtio-rng.c 59 60 #ifdef CONFIG_SYSFS > 61 ssize_t virtrng_sysfs_read(struct file *filep, struct kobject *kobj, 62 struct bin_attribute *attr, char *buf, loff_t pos, size_t len) 63 { 64 struct virtrng_info *vi = attr->private; 65 unsigned long gen_counter = *(unsigned long *)vi->map_buffer; 66 67 if (!len) 68 return 0; 69 70 len = min(len, sizeof(gen_counter)); 71 memcpy(buf, &gen_counter, len); 72 73 return len; 74 } 75 > 76 int virtrng_sysfs_mmap(struct file *filep, struct kobject *kobj, 77 struct bin_attribute *attr, struct vm_area_struct *vma) 78 { 79 struct virtrng_info *vi = attr->private; 80 81 if (vma->vm_pgoff || vma_pages(vma) > 1) 82 return -EINVAL; 83 84 if (vma->vm_flags & VM_WRITE) 85 return -EPERM; 86 87 vma->vm_flags |= VM_DONTEXPAND; 88 vma->vm_flags &= ~VM_MAYWRITE; 89 90 return vm_insert_page(vma, vma->vm_start, virt_to_page(vi->map_buffer)); 91 } 92 #endif 93 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests