lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202111172129.2yMYY42h-lkp@intel.com>
Date:   Wed, 17 Nov 2021 21:30:40 +0800
From:   kernel test robot <lkp@...el.com>
To:     "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>
Cc:     kbuild-all@...ts.01.org, linux-kernel@...r.kernel.org,
        Kuppuswamy Sathyanarayanan 
        <sathyanarayanan.kuppuswamy@...ux.intel.com>,
        Andi Kleen <ak@...ux.intel.com>,
        Tony Luck <tony.luck@...el.com>
Subject: [intel-tdx:guest-upstream 29/37] arch/x86/mm/mem_encrypt.c:96:13:
 warning: no previous prototype for 'mem_encrypt_init'

tree:   https://github.com/intel/tdx.git guest-upstream
head:   6d174fafe2becc43fd3eaebd3112a5a271b82ded
commit: 3a38521c8205c1c951e57551558dbfec739516cd [29/37] x86/tdx: Make pages shared in ioremap()
config: x86_64-allyesconfig (attached as .config)
compiler: gcc-9 (Debian 9.3.0-22) 9.3.0
reproduce (this is a W=1 build):
        # https://github.com/intel/tdx/commit/3a38521c8205c1c951e57551558dbfec739516cd
        git remote add intel-tdx https://github.com/intel/tdx.git
        git fetch --no-tags intel-tdx guest-upstream
        git checkout 3a38521c8205c1c951e57551558dbfec739516cd
        # save the attached .config to linux build tree
        make W=1 ARCH=x86_64 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@...el.com>

All warnings (new ones prefixed by >>):

>> arch/x86/mm/mem_encrypt.c:96:13: warning: no previous prototype for 'mem_encrypt_init' [-Wmissing-prototypes]
      96 | void __init mem_encrypt_init(void)
         |             ^~~~~~~~~~~~~~~~


vim +/mem_encrypt_init +96 arch/x86/mm/mem_encrypt.c

446571d51af2609 Kirill A. Shutemov 2020-03-18   94  
446571d51af2609 Kirill A. Shutemov 2020-03-18   95  /* Architecture __weak replacement functions */
446571d51af2609 Kirill A. Shutemov 2020-03-18  @96  void __init mem_encrypt_init(void)
446571d51af2609 Kirill A. Shutemov 2020-03-18   97  {
446571d51af2609 Kirill A. Shutemov 2020-03-18   98  	if (!sme_me_mask)
446571d51af2609 Kirill A. Shutemov 2020-03-18   99  		return;
446571d51af2609 Kirill A. Shutemov 2020-03-18  100  
446571d51af2609 Kirill A. Shutemov 2020-03-18  101  	/* Call into SWIOTLB to update the SWIOTLB DMA buffers */
446571d51af2609 Kirill A. Shutemov 2020-03-18  102  	swiotlb_update_mem_attributes();
446571d51af2609 Kirill A. Shutemov 2020-03-18  103  
446571d51af2609 Kirill A. Shutemov 2020-03-18  104  	print_amd_mem_encrypt_feature_info();
446571d51af2609 Kirill A. Shutemov 2020-03-18  105  }
446571d51af2609 Kirill A. Shutemov 2020-03-18  106  

:::::: The code at line 96 was first introduced by commit
:::::: 446571d51af2609e66067b08442c89c5afd07843 x86: Move common memory encryption code to mem_encrypt.c

:::::: TO: Kirill A. Shutemov <kirill.shutemov@...ux.intel.com>
:::::: CC: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@...ux.intel.com>

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

Download attachment ".config.gz" of type "application/gzip" (65323 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ