From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on gnuweeb.org X-Spam-Level: X-Spam-Status: No, score=-3.5 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_PASS, SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by gnuweeb.org (Postfix) with ESMTPS id 71FF37E723 for ; Wed, 30 Mar 2022 02:47:41 +0000 (UTC) Authentication-Results: gnuweeb.org; dkim=pass (2048-bit key; unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256 header.s=Intel header.b=U7qM4V/M; dkim-atps=neutral DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1648608461; x=1680144461; h=date:from:to:cc:subject:message-id:mime-version; bh=Iiz9yNZ9QU41lXDiDYLYbnUSqX5P7jJcuLjuIlo+0OE=; b=U7qM4V/MyfjZVca8FfnNQHNhY4OP3UObgm++iH8zO2gOalUr0GdN/olJ wRjqLrGK2hmkmShyfuBAjhOmHh0/v5KZbP48Th62FAFeVEjwtwVnKiq5A v6IPXLwIMGEjlSrGuxsfvdcMcFn8NYHTAdOtwIXitWfcKr9ohdnu7WhKB 1XC8o4opy/kxT5jXe/pQXOykci8YlifSk0ZbBe8Ud5+SCsQfudPuOxe2/ /JafcQqljmEHi/9uzKkIRaNLgeTiI36ApRHLiSN12n8kag8S5Z63oQqvg 6d94EqSakEZ5bUZ3RZPCl9EwjpdWi9L7zH6HWnXk94aUMX/hc4yHRgNzo g==; X-IronPort-AV: E=McAfee;i="6200,9189,10301"; a="239359698" X-IronPort-AV: E=Sophos;i="5.90,221,1643702400"; d="scan'208";a="239359698" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 Mar 2022 19:47:40 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.90,221,1643702400"; d="scan'208";a="653496983" Received: from lkp-server01.sh.intel.com (HELO 3965e2759b93) ([10.239.97.150]) by orsmga004.jf.intel.com with ESMTP; 29 Mar 2022 19:47:38 -0700 Received: from kbuild by 3965e2759b93 with local (Exim 4.92) (envelope-from ) id 1nZOMz-0000vB-UH; Wed, 30 Mar 2022 02:47:37 +0000 Date: Wed, 30 Mar 2022 10:46:46 +0800 From: kernel test robot To: Will Deacon Cc: kbuild-all@lists.01.org, GNU/Weeb Mailing List , linux-kernel@vger.kernel.org, Ard Biesheuvel Subject: [ammarfaizi2-block:google/android/kernel/common/android13-5.15 2786/5614] arch/arm64/kvm/arm.c:2011:46: error: 'smccc_trng_available' undeclared Message-ID: <202203301057.pfu4qQMj-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) List-Id: Hi Will, FYI, the error/warning still remains. tree: https://github.com/ammarfaizi2/linux-block google/android/kernel/common/android13-5.15 head: 12972dd7bfa306aa07c92966c4efe7b1c0c5e043 commit: 888643ea37b504cb32afdd6430698d1e92a79a71 [2786/5614] ANDROID: KVM: arm64: relay entropy requests from protected guests directly to secure config: arm64-randconfig-r013-20220327 (https://download.01.org/0day-ci/archive/20220330/202203301057.pfu4qQMj-lkp@intel.com/config) compiler: aarch64-linux-gcc (GCC) 11.2.0 reproduce (this is a W=1 build): wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # https://github.com/ammarfaizi2/linux-block/commit/888643ea37b504cb32afdd6430698d1e92a79a71 git remote add ammarfaizi2-block https://github.com/ammarfaizi2/linux-block git fetch --no-tags ammarfaizi2-block google/android/kernel/common/android13-5.15 git checkout 888643ea37b504cb32afdd6430698d1e92a79a71 # save the config file to linux build tree mkdir build_dir COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-11.2.0 make.cross O=build_dir ARCH=arm64 SHELL=/bin/bash arch/arm64/kvm/ If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot All errors (new ones prefixed by >>): arch/arm64/kvm/arm.c: In function 'kvm_hyp_init_protection': >> arch/arm64/kvm/arm.c:2011:46: error: 'smccc_trng_available' undeclared (first use in this function) 2011 | kvm_nvhe_sym(smccc_trng_available) = smccc_trng_available; | ^~~~~~~~~~~~~~~~~~~~ arch/arm64/kvm/arm.c:2011:46: note: each undeclared identifier is reported only once for each function it appears in vim +/smccc_trng_available +2011 arch/arm64/kvm/arm.c 1997 1998 static int kvm_hyp_init_protection(u32 hyp_va_bits) 1999 { 2000 void *addr = phys_to_virt(hyp_mem_base); 2001 int ret; 2002 2003 kvm_nvhe_sym(id_aa64pfr0_el1_sys_val) = read_sanitised_ftr_reg(SYS_ID_AA64PFR0_EL1); 2004 kvm_nvhe_sym(id_aa64pfr1_el1_sys_val) = read_sanitised_ftr_reg(SYS_ID_AA64PFR1_EL1); 2005 kvm_nvhe_sym(id_aa64isar0_el1_sys_val) = read_sanitised_ftr_reg(SYS_ID_AA64ISAR0_EL1); 2006 kvm_nvhe_sym(id_aa64isar1_el1_sys_val) = read_sanitised_ftr_reg(SYS_ID_AA64ISAR1_EL1); 2007 kvm_nvhe_sym(id_aa64mmfr0_el1_sys_val) = read_sanitised_ftr_reg(SYS_ID_AA64MMFR0_EL1); 2008 kvm_nvhe_sym(id_aa64mmfr1_el1_sys_val) = read_sanitised_ftr_reg(SYS_ID_AA64MMFR1_EL1); 2009 kvm_nvhe_sym(id_aa64mmfr2_el1_sys_val) = read_sanitised_ftr_reg(SYS_ID_AA64MMFR2_EL1); 2010 kvm_nvhe_sym(__icache_flags) = __icache_flags; > 2011 kvm_nvhe_sym(smccc_trng_available) = smccc_trng_available; 2012 2013 ret = create_hyp_mappings(addr, addr + hyp_mem_size, PAGE_HYP); 2014 if (ret) 2015 return ret; 2016 2017 ret = init_stage2_iommu(); 2018 if (ret < 0) 2019 return ret; 2020 2021 ret = do_pkvm_init(hyp_va_bits, (enum kvm_iommu_driver)ret); 2022 if (ret) 2023 return ret; 2024 2025 free_hyp_pgds(); 2026 2027 return 0; 2028 } 2029 -- 0-DAY CI Kernel Test Service https://01.org/lkp