lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <202203030553.577m0VYs-lkp@intel.com> Date: Thu, 3 Mar 2022 05:28:40 +0800 From: kernel test robot <lkp@...el.com> To: Satya Tangirala <satyat@...gle.com> Cc: kbuild-all@...ts.01.org, GNU/Weeb Mailing List <gwml@...r.gnuweeb.org>, linux-kernel@...r.kernel.org Subject: [ammarfaizi2-block:google/android/kernel/common/android-4.14-stable 2233/9999] drivers/scsi/ufs/ufshcd-crypto.c:250:26: warning: no previous declaration for 'ufshcd_blk_crypto_mode_num_for_alg_dusize' Hi Satya, FYI, the error/warning still remains. tree: https://github.com/ammarfaizi2/linux-block google/android/kernel/common/android-4.14-stable head: 4ab5bac1598e3ed91a6267f6cada336467312112 commit: e12563c18d484e6379d03105b4565db7bb3a7975 [2233/9999] BACKPORT: FROMLIST: Update Inline Encryption from v5 to v6 of patch series config: i386-allyesconfig (https://download.01.org/0day-ci/archive/20220303/202203030553.577m0VYs-lkp@intel.com/config) compiler: gcc-7 (Ubuntu 7.5.0-6ubuntu2) 7.5.0 reproduce (this is a W=1 build): # https://github.com/ammarfaizi2/linux-block/commit/e12563c18d484e6379d03105b4565db7bb3a7975 git remote add ammarfaizi2-block https://github.com/ammarfaizi2/linux-block git fetch --no-tags ammarfaizi2-block google/android/kernel/common/android-4.14-stable git checkout e12563c18d484e6379d03105b4565db7bb3a7975 # save the config file to linux build tree mkdir build_dir make W=1 O=build_dir ARCH=i386 SHELL=/bin/bash drivers/mmc/core/ drivers/scsi/ufs/ If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot <lkp@...el.com> All warnings (new ones prefixed by >>): >> drivers/scsi/ufs/ufshcd-crypto.c:250:26: warning: no previous declaration for 'ufshcd_blk_crypto_mode_num_for_alg_dusize' [-Wmissing-declarations] enum blk_crypto_mode_num ufshcd_blk_crypto_mode_num_for_alg_dusize( ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ vim +/ufshcd_blk_crypto_mode_num_for_alg_dusize +250 drivers/scsi/ufs/ufshcd-crypto.c 249 > 250 enum blk_crypto_mode_num ufshcd_blk_crypto_mode_num_for_alg_dusize( 251 enum ufs_crypto_alg ufs_crypto_alg, 252 enum ufs_crypto_key_size key_size) 253 { 254 /* 255 * This is currently the only mode that UFS and blk-crypto both support. 256 */ 257 if (ufs_crypto_alg == UFS_CRYPTO_ALG_AES_XTS && 258 key_size == UFS_CRYPTO_KEY_SIZE_256) 259 return BLK_ENCRYPTION_MODE_AES_256_XTS; 260 261 return BLK_ENCRYPTION_MODE_INVALID; 262 } 263 --- 0-DAY CI Kernel Test Service, Intel Corporation https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org
Powered by blists - more mailing lists