From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.6 required=3.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id BD7E2C433E3 for ; Sat, 22 Aug 2020 04:50:19 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 97CD62078D for ; Sat, 22 Aug 2020 04:50:19 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=chronox.de header.i=@chronox.de header.b="WEBOQpoX" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726502AbgHVEuS (ORCPT ); Sat, 22 Aug 2020 00:50:18 -0400 Received: from mo4-p01-ob.smtp.rzone.de ([85.215.255.52]:11649 "EHLO mo4-p01-ob.smtp.rzone.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725856AbgHVEuR (ORCPT ); Sat, 22 Aug 2020 00:50:17 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1598071815; s=strato-dkim-0002; d=chronox.de; h=References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From: X-RZG-CLASS-ID:X-RZG-AUTH:From:Subject:Sender; bh=7jcMal0RXGcmBo3zYahrDP9hAL12aQjPjkXNusGqm2g=; b=WEBOQpoXY4w/YsRh/1uCZQ1TZp0zSN3qc4BTFtOEhqzHfKdEmQYcc8RXd/eedD5Odm H+q6vwlfX60M6RoCQKVRp8m12qx+7gWmoxey04JOG7f/NjkgDkqtuuBGCL+RKvy0bipZ iGb5lpD1lrFdM0xuwsrFa2l7WSlyVDXiJBSFaC+la7E9zThX4G1SkG3+KXiNerDFBVIL nKOob0h2fjk3/gW64/qdytZz4039ATLneyQ+lDjLe9+x/sObxyQRj/a6NhgnC1fLR/Uc 8zZYzEB6MD2xFKK8MJPA8jXOOyO/Bdqahi/qdezxL+S9Kl4MzXRjFhoV/6maBxLX44Up 6zLA== X-RZG-AUTH: ":P2ERcEykfu11Y98lp/T7+hdri+uKZK8TKWEqNyiHySGSa9k9xm0dNS3IdRAZAL+p6A==" X-RZG-CLASS-ID: mo00 Received: from positron.chronox.de by smtp.strato.de (RZmta 46.10.7 DYNA|AUTH) with ESMTPSA id 002e9aw7M4nRLT1 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits)) (Client did not present a certificate); Sat, 22 Aug 2020 06:49:27 +0200 (CEST) From: Stephan =?ISO-8859-1?Q?M=FCller?= To: Arnd Bergmann , kernel test robot Cc: kbuild-all@lists.01.org, Greg Kroah-Hartman , linux-crypto@vger.kernel.org, LKML , linux-api@vger.kernel.org, "Eric W. Biederman" , "Alexander E. Patrakov" , "Ahmed S. Darwish" , "Theodore Y. Ts'o" , Willy Tarreau Subject: Re: [PATCH v33 01/12] Linux Random Number Generator Date: Sat, 22 Aug 2020 06:49:27 +0200 Message-ID: <5635338.lOV4Wx5bFT@positron.chronox.de> In-Reply-To: <202008220336.BQnuDlaK%lkp@intel.com> References: <7836152.NyiUUSuA9g@positron.chronox.de> <202008220336.BQnuDlaK%lkp@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Am Freitag, 21. August 2020, 21:42:17 CEST schrieb kernel test robot: Hi, > > hppa-linux-ld: lib/random32.o: in function `prandom_u32': > >> (.text+0x318): undefined reference to `__tracepoint_prandom_u32' > >> hppa-linux-ld: (.text+0x31c): undefined reference to > >> `__tracepoint_prandom_u32' hppa-linux-ld: > >> lib/random32.o:(__jump_table+0x8): undefined reference to > >> `__tracepoint_prandom_u32' This is caused by the fact that the LRNG code does not include trace/events/ random.h. However, a patch to lib/random32.c now requires this file to be included and creating a tracepoint. I.e. lib/random32.c code now relies on some other code to create the necessary hook. I have added the include and will provide it with the next release although I am not sure lib/random32.c should rely on some other code to create its dependencies. Ciao Stephan