Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp1902747rwb; Thu, 19 Jan 2023 17:32:07 -0800 (PST) X-Google-Smtp-Source: AMrXdXsgNh+7Xwi53vgogYkxmSbBI4o6mpdoNGMGH9aPqhNit/xNwHXsSov5Lnuv8wqe5dQm+yeF X-Received: by 2002:a17:90a:cf8c:b0:229:111:1b07 with SMTP id i12-20020a17090acf8c00b0022901111b07mr14021621pju.48.1674178327611; Thu, 19 Jan 2023 17:32:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674178327; cv=none; d=google.com; s=arc-20160816; b=j5UB2vXArYvn4FQXb2jS0bP7Q2DzXIVUjDcpwlCW4jxJbiFR5nwfv9qcVma1V5Kmwl 0EtxPalJnMCnSl+uTJMFlYDdyynknU582mLUKK6D3Exqd30z4EpkkvfRtnjTJkxYr9Wk p2JmAvtAGnPyNtqgzK8Y8fpFy18FpTTZqyw9eYw3uCdg6WnZIUvDSasGJ8L7iQhGfR+Q 9YGamRxPpAPVmkcxfukT8a3m+cPARxX1V4H/tXi8h69OLG1vTDG67Ywp+APUm8Giwu6g H6SIcKbieHBMc3XVJo2n3t7dVixN6SzMAVzQ1RZSn9ilgekcLXiZjiSFQH44CnarKWfn fiiA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=I7I4V+6c7Am22uUXk0vi3mMW6YSm8nFGfeiR+f+MWwM=; b=w57ONA/eE1wefceovwQeipHghUBH5UvKp+exJZMLGEsf0DEuMlNGO0eqkGwtAXUVPC uJSNSc/1B1J2W5xxXArCwVLh1YCOCE5rqORt5v7GjAxhhYSt3F4INxS35OWzfUqwfank h3WBbtexZ4P1jUOmkCzG27jgvfxpgaJCSW0MGovE1tUrMu3UMeY9dJqgzhLZUX++fGiM ysOMg1bxn0vmEA18HfXTtEFxPVLSXIdHQyvVOKtW4POuvoFqlxcCoN6Ux8/I8YA1e8Vj L6TkNP9ithYc1iF9kgpnV1N94K9PStRhq/erfrozwO/zU1cf+wX2GhOGWl/0Hrt0XO/X sP9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=NqwpVAxe; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 1-20020a630001000000b0047947d45f59si43139551pga.651.2023.01.19.17.31.48; Thu, 19 Jan 2023 17:32:07 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=NqwpVAxe; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229931AbjATBZi (ORCPT + 99 others); Thu, 19 Jan 2023 20:25:38 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41740 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229669AbjATBZh (ORCPT ); Thu, 19 Jan 2023 20:25:37 -0500 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 2FA01A295C; Thu, 19 Jan 2023 17:25:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1674177936; x=1705713936; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=M4LsMrjiwewko2El9282LT8xvci0f+i1gtrjEfFkacQ=; b=NqwpVAxeJR/2ivRrR07oerGNiEQCnoKFA/ARWM1x8Gu3iJQpy6rBMDvX 8D9r+G3rnmn1LFFpZQ/UYw6aGbEPo60TRI+2LP/bR4vG+rJiwbjNg0VzN iyI91lEvOLaPQ/igKJ4Fu9gks3b6Lo/al4jou4rrBfZXF1Tj5D+skjDPP UnKm26MqP2eraUAaJWLJ3QXpGyZDp96xJafEqP8QUYJAOJDj7FVG/kQJ4 Y8VRio/pGeTsw7MVBmUwCPD2bRV+xt7xA8wBE3b2/H8rjm6AVl2ofKjiC vOPH302ZP+inA/7izuo284l0wi5umokRjM/ccg00bBNQAaZrjCfPm1XMQ A==; X-IronPort-AV: E=McAfee;i="6500,9779,10595"; a="305158448" X-IronPort-AV: E=Sophos;i="5.97,230,1669104000"; d="scan'208";a="305158448" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Jan 2023 17:25:35 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10595"; a="989246930" X-IronPort-AV: E=Sophos;i="5.97,230,1669104000"; d="scan'208";a="989246930" Received: from lkp-server01.sh.intel.com (HELO 5646d64e7320) ([10.239.97.150]) by fmsmga005.fm.intel.com with ESMTP; 19 Jan 2023 17:25:32 -0800 Received: from kbuild by 5646d64e7320 with local (Exim 4.96) (envelope-from ) id 1pIg9r-00022y-1Z; Fri, 20 Jan 2023 01:25:31 +0000 Date: Fri, 20 Jan 2023 09:24:45 +0800 From: kernel test robot To: Babis Chalios , Olivia Mackall , Herbert Xu , "Michael S. Tsirkin" , Jason Wang , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, virtualization@lists.linux-foundation.org Cc: oe-kbuild-all@lists.linux.dev, amit@kernel.org, graf@amazon.de, Jason@zx2c4.com, xmarcalx@amazon.co.uk Subject: Re: [PATCH 1/2] virtio-rng: implement entropy leak feature Message-ID: <202301200941.fE9QkyE3-lkp@intel.com> References: <20230119184349.74072-2-bchalios@amazon.es> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230119184349.74072-2-bchalios@amazon.es> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_PASS,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi Babis, Thank you for the patch! Perhaps something to improve: [auto build test WARNING on char-misc/char-misc-testing] [also build test WARNING on char-misc/char-misc-next char-misc/char-misc-linus linus/master v6.2-rc4 next-20230119] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Babis-Chalios/virtio-rng-implement-entropy-leak-feature/20230120-024631 patch link: https://lore.kernel.org/r/20230119184349.74072-2-bchalios%40amazon.es patch subject: [PATCH 1/2] virtio-rng: implement entropy leak feature config: x86_64-randconfig-s021 (https://download.01.org/0day-ci/archive/20230120/202301200941.fE9QkyE3-lkp@intel.com/config) compiler: gcc-11 (Debian 11.3.0-8) 11.3.0 reproduce: # apt-get install sparse # sparse version: v0.6.4-39-gce1a6720-dirty # https://github.com/intel-lab-lkp/linux/commit/686114cbba5005584d458ad44164b4a4b88135f5 git remote add linux-review https://github.com/intel-lab-lkp/linux git fetch --no-tags linux-review Babis-Chalios/virtio-rng-implement-entropy-leak-feature/20230120-024631 git checkout 686114cbba5005584d458ad44164b4a4b88135f5 # save the config file mkdir build_dir && cp config build_dir/.config make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=x86_64 olddefconfig make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=x86_64 SHELL=/bin/bash drivers/char/hw_random/ If you fix the issue, kindly add following tag where applicable | Reported-by: kernel test robot sparse warnings: (new ones prefixed by >>) >> drivers/char/hw_random/virtio-rng.c:59:5: sparse: sparse: symbol 'add_fill_on_leak_request' was not declared. Should it be static? >> drivers/char/hw_random/virtio-rng.c:73:5: sparse: sparse: symbol 'virtrng_fill_on_leak' was not declared. Should it be static? >> drivers/char/hw_random/virtio-rng.c:94:5: sparse: sparse: symbol 'add_copy_on_leak_request' was not declared. Should it be static? >> drivers/char/hw_random/virtio-rng.c:113:5: sparse: sparse: symbol 'virtrng_copy_on_leak' was not declared. Should it be static? -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests