From patchwork Mon Oct 24 02:23:19 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stephen Rothwell X-Patchwork-Id: 8128 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp217701wru; Sun, 23 Oct 2022 19:36:20 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7+AvLmCDQLXtj0unh0I738dyKGPyW5/VvxJWSqJ1wqVIa0YEes5yl3nWM4V4L9ffzGEvit X-Received: by 2002:a17:902:7c91:b0:17f:6711:1fac with SMTP id y17-20020a1709027c9100b0017f67111facmr31609911pll.118.1666578979748; Sun, 23 Oct 2022 19:36:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666578979; cv=none; d=google.com; s=arc-20160816; b=DlhxqqDiAeLqTtJQOp96rfPslWXhDcFJjwHhuju84U4y+vhZ7pLdzJGMgRUPXnGbqc ERTimCb8qteinvUWclDFAAGoffmXNIuSJEYSjMFkygC3c51sUJ18mPbPTZvp8IdWAh07 7rCuNNdT2h1/f+srdBk9lNu2nVRhyyVGiNMd9IjCW1WPxNWB4arwtiaVuhhrfNCqLKq1 DY8fOdfFFMzOV+/qyYh+jtQy7nVw1fF3/nzmbvwLq14NYHm2CkFHpmen8V3uN8zQfqar EtBlcN+8sBQdJTAmc69Y3Bx3lM7XjA3hYyYJLJXtB1NWFnpcry0lYt9y23kOT8QmRIRo x/4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:subject:cc:to:from:date :dkim-signature; bh=/Tq9xRBdbj+40nhvqAduH8dkk6pDuOMySNItE+cAbTQ=; b=ou1uOHe/aLcBiyqDOm9Fc3+HH2Av5VZlC6I+Lk0i/kGVp1C7pY5EkLikswIUmypJg6 oa5p2Tx7Kw/pYyL8urTjmMNNxDe834DmWVI8l5evj8y2W6b/QSUjtSwlUVzv9vbIUnzH l83SFz/DgRtzOGSbg0Ip+lVs4bdYvrFrBbTuvRLPuOA9sW35q1Tj8+HLAslmethlhzcq NhKPIOaq+xeOOHLm8NuhBN4omUFG+FbehPmJzOL12mgV7g61l71DfIZu71Rl90twgKBX CJjmJ8nHhhs6jMN2OK5bpZWR2ePGJdvg52WqTg6WoRbhtwNnRYsslNzgGjIo7B1VGA9P stlw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canb.auug.org.au header.s=201702 header.b=geXXeI+L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s10-20020a17090a760a00b002131bb4043asi867369pjk.177.2022.10.23.19.36.07; Sun, 23 Oct 2022 19:36:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@canb.auug.org.au header.s=201702 header.b=geXXeI+L; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229867AbiJXCXd (ORCPT + 99 others); Sun, 23 Oct 2022 22:23:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48354 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229562AbiJXCXb (ORCPT ); Sun, 23 Oct 2022 22:23:31 -0400 Received: from gandalf.ozlabs.org (mail.ozlabs.org [IPv6:2404:9400:2221:ea00::3]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AB8B972EED; Sun, 23 Oct 2022 19:23:28 -0700 (PDT) Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4Mwf4n4gDtz4xGG; Mon, 24 Oct 2022 13:23:21 +1100 (AEDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canb.auug.org.au; s=201702; t=1666578203; bh=/Tq9xRBdbj+40nhvqAduH8dkk6pDuOMySNItE+cAbTQ=; h=Date:From:To:Cc:Subject:From; b=geXXeI+LvuUptQOBfE23YjsBENA5txOHrxwJrTl1TyNBeLEJN7DFjKlqIHu949fuu FjkQ9TDZqGqMzb1TlATJhBkbs3jNPssm/F5y++HEyWuEMLdWCgWmhESaIpl26EtRRV ezkckF94BgrVDv8lVNdLJtK61IwJK4iDoERDoZ/m4VyfJSQwOvjFeWv6zuVOB76in0 vNSQCmGh9p1jiIyAD10Q6+/Z6Mef9zl6AM8Cp5oiCiESq0k7ym79YjodBRqt28d6SM qCipC418Y4hjr+JefECeK5gBbrHIFytrE1P9Apcc3bgyGb38rlRNjCiaxfG3OQiSQR dYhZBa+pv2Zgg== Date: Mon, 24 Oct 2022 13:23:19 +1100 From: Stephen Rothwell To: Theodore Ts'o , "Jason A. Donenfeld" , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Peter Zijlstra Cc: Linux Kernel Mailing List , Linux Next Mailing List Subject: linux-next: build failure after merge of the random tree Message-ID: <20221024132319.4b3910ad@canb.auug.org.au> MIME-Version: 1.0 X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,RCVD_IN_DNSWL_MED,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1747534720318406138?= X-GMAIL-MSGID: =?utf-8?q?1747534720318406138?= Hi all, After merging the random tree, today's linux-next build (x86_64 allmodconfig) failed like this: arch/x86/mm/cpu_entry_area.c: In function 'init_cea_offsets': arch/x86/mm/cpu_entry_area.c:38:23: error: implicit declaration of function 'prandom_u32_max'; did you mean 'prandom_u32_state'? [-Werror=implicit-function-declaration] 38 | cea = prandom_u32_max(max_cea); | ^~~~~~~~~~~~~~~ | prandom_u32_state cc1: all warnings being treated as errors Caused by commit 921b09c09fe7 ("prandom: remove prandom_u32_max()") interacting with commit 1248fb6a8201 ("x86/mm: Randomize per-cpu entry area") from the tip tree. I have applied the following fix up patch for today. From: Stephen Rothwell Date: Mon, 24 Oct 2022 12:37:28 +1100 Subject: [PATCH] fix up for "prandom: remove prandom_u32_max()" Signed-off-by: Stephen Rothwell --- arch/x86/mm/cpu_entry_area.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/mm/cpu_entry_area.c b/arch/x86/mm/cpu_entry_area.c index ad1f750517a1..7a1b63fb80d3 100644 --- a/arch/x86/mm/cpu_entry_area.c +++ b/arch/x86/mm/cpu_entry_area.c @@ -35,7 +35,7 @@ static __init void init_cea_offsets(void) unsigned int cea; again: - cea = prandom_u32_max(max_cea); + cea = get_random_u32_below(max_cea); /* Make sure that no previous CPU shares the offset: */ for_each_possible_cpu(j) {