lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Tue, 15 Nov 2022 06:42:15 +0800
From:   kernel test robot <lkp@...el.com>
To:     Xie XiuQi <xiexiuqi@...wei.com>, catalin.marinas@....com,
        will@...nel.org, james.morse@....com, bp@...en8.de,
        linux-arm-kernel@...ts.infradead.org, linux-acpi@...r.kernel.org,
        linux-kernel@...r.kernel.org
Cc:     oe-kbuild-all@...ts.linux.dev, tanxiaofei@...wei.com,
        lvying6@...wei.com
Subject: Re: [PATCH] arm64: fix error unhandling in synchronous External Data
 Abort

Hi Xie,

Thank you for the patch! Perhaps something to improve:

[auto build test WARNING on arm64/for-next/core]
[also build test WARNING on rafael-pm/linux-next arm/for-next arm/fixes kvmarm/next soc/for-next xilinx-xlnx/master linus/master v6.1-rc5 next-20221114]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch#_base_tree_information]

url:    https://github.com/intel-lab-lkp/linux/commits/Xie-XiuQi/arm64-fix-error-unhandling-in-synchronous-External-Data-Abort/20221114-230843
base:   https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-next/core
patch link:    https://lore.kernel.org/r/20221114151915.167414-1-xiexiuqi%40huawei.com
patch subject: [PATCH] arm64: fix error unhandling in synchronous External Data Abort
config: x86_64-allyesconfig
compiler: gcc-11 (Debian 11.3.0-8) 11.3.0
reproduce (this is a W=1 build):
        # https://github.com/intel-lab-lkp/linux/commit/61e4e4759be73a28ddf53ec009d56767a69e7b9b
        git remote add linux-review https://github.com/intel-lab-lkp/linux
        git fetch --no-tags linux-review Xie-XiuQi/arm64-fix-error-unhandling-in-synchronous-External-Data-Abort/20221114-230843
        git checkout 61e4e4759be73a28ddf53ec009d56767a69e7b9b
        # save the config file
        mkdir build_dir && cp config build_dir/.config
        make W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash drivers/acpi/

If you fix the issue, kindly add following tag where applicable
| Reported-by: kernel test robot <lkp@...el.com>

All warnings (new ones prefixed by >>):

   drivers/acpi/apei/apei-base.c:763:12: warning: no previous prototype for 'arch_apei_enable_cmcff' [-Wmissing-prototypes]
     763 | int __weak arch_apei_enable_cmcff(struct acpi_hest_header *hest_hdr,
         |            ^~~~~~~~~~~~~~~~~~~~~~
   drivers/acpi/apei/apei-base.c:770:13: warning: no previous prototype for 'arch_apei_report_mem_error' [-Wmissing-prototypes]
     770 | void __weak arch_apei_report_mem_error(int sev,
         |             ^~~~~~~~~~~~~~~~~~~~~~~~~~
>> drivers/acpi/apei/apei-base.c:776:13: warning: no previous prototype for 'arch_apei_do_unhandled_sea' [-Wmissing-prototypes]
     776 | void __weak arch_apei_do_unhandled_sea(void)
         |             ^~~~~~~~~~~~~~~~~~~~~~~~~~


vim +/arch_apei_do_unhandled_sea +776 drivers/acpi/apei/apei-base.c

   762	
 > 763	int __weak arch_apei_enable_cmcff(struct acpi_hest_header *hest_hdr,
   764					  void *data)
   765	{
   766		return 1;
   767	}
   768	EXPORT_SYMBOL_GPL(arch_apei_enable_cmcff);
   769	
   770	void __weak arch_apei_report_mem_error(int sev,
   771					       struct cper_sec_mem_err *mem_err)
   772	{
   773	}
   774	EXPORT_SYMBOL_GPL(arch_apei_report_mem_error);
   775	
 > 776	void __weak arch_apei_do_unhandled_sea(void)
   777	{
   778	}
   779	

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp

View attachment "config" of type "text/plain" (291877 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ