From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 37402C25B08 for ; Wed, 17 Aug 2022 08:17:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-ID:Subject:Cc:To: From:Date:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=1/Ihd7Pel5eBFH6YNt9k3m48aQigwSLxTyXpb+XqjUc=; b=Sb3x0KvvqzDJJx oOfL8aPCAjHLboRxoq65uYjvDRB2Zq9JEoBLFKmhQ1q86S+MrRWF6b93PoNFf/0hZeHZlGA002CyZ K584SnqGC1BJDozpdwQf32I5qBEIyO5xOCAzFVp3qy6V4ScYzcium2eusFQwflFT+K5KJ1krcsJ3D HudBnGY933Xr178fJRG8Z+LOysCriYa/DimL3xR4dawc9qKkENUbnpymIAOM1YRYBh+CpFJyO4lMe 7p6G/em64vkJXYurnF08KcIdLjZbtKfznkGi5/PhUz5Y2P66Z0K60zatv2yCTkvqvmmpQg+VxFDSz PQ7iA+kTAX0U8khW8/iA==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1oOEDd-00EkA4-2b; Wed, 17 Aug 2022 08:16:05 +0000 Received: from mga18.intel.com ([134.134.136.126]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1oOEBv-00Ehnn-KE for linux-arm-kernel@lists.infradead.org; Wed, 17 Aug 2022 08:14:22 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1660724059; x=1692260059; h=date:from:to:cc:subject:message-id:mime-version; bh=AL/+3EQRt5LNciW3Z+LVZaS7s54YYxbjSsMUwa2LRLE=; b=XbqyV24pEU96vCXkutBwW2H+naDyJiVJrv8nT6xNQbD9Kj4TDCkE0VxP US1zoqQIKwZ6Kow+LTN9fFcjLB4FjKjdNwaEkMRNZVUvcCTInx5XcULdh /nMxwbpLWkRGDiIza5Sz7UMGUNoN3GoxgD0dhSGRE8cI3rQF8ocmzu62f 1DJ6MioqZuiow6lFmTtw4nCgFqGg7KjTIUMvjUOJpHhfmtXqLqHhXj932 7SKBXdHxGun2Kht6yO+EEarUCMNmEZx21x5AWEGyxHYJ9ZOZgBIlhE2gO hOhksm3lA9+uwX6maKRaHHHBuMOjXsPDN7KG2exj6wrRrwFzDkBEw5DQp Q==; X-IronPort-AV: E=McAfee;i="6400,9594,10441"; a="275489064" X-IronPort-AV: E=Sophos;i="5.93,242,1654585200"; d="scan'208";a="275489064" Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Aug 2022 01:14:16 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.93,242,1654585200"; d="scan'208";a="675548891" Received: from lkp-server02.sh.intel.com (HELO 81d7e1ade3ba) ([10.239.97.151]) by fmsmga004.fm.intel.com with ESMTP; 17 Aug 2022 01:14:14 -0700 Received: from kbuild by 81d7e1ade3ba with local (Exim 4.96) (envelope-from ) id 1oOEBq-0000iz-1A; Wed, 17 Aug 2022 08:14:14 +0000 Date: Wed, 17 Aug 2022 16:13:53 +0800 From: kernel test robot To: Linus Walleij Cc: kbuild-all@lists.01.org, linux-arm-kernel@lists.infradead.org Subject: [linusw-nomadik:ux500-crypto-fb-stab 24/24] drivers/crypto/ux500/hash/hash_alg.h:198:33: error: field 'fallback_req' has incomplete type Message-ID: <202208171544.94dYWwp0-lkp@intel.com> MIME-Version: 1.0 Content-Disposition: inline X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220817_011419_779883_10BFE09D X-CRM114-Status: GOOD ( 19.13 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org tree: https://git.kernel.org/pub/scm/linux/kernel/git/linusw/linux-nomadik.git ux500-crypto-fb-stab head: 8b966d88af5f34992cc041b8c1a3aa8ff6e166d3 commit: 8b966d88af5f34992cc041b8c1a3aa8ff6e166d3 [24/24] fallback stab config: arm-allyesconfig (https://download.01.org/0day-ci/archive/20220817/202208171544.94dYWwp0-lkp@intel.com/config) compiler: arm-linux-gnueabi-gcc (GCC) 12.1.0 reproduce (this is a W=1 build): wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # https://git.kernel.org/pub/scm/linux/kernel/git/linusw/linux-nomadik.git/commit/?id=8b966d88af5f34992cc041b8c1a3aa8ff6e166d3 git remote add linusw-nomadik https://git.kernel.org/pub/scm/linux/kernel/git/linusw/linux-nomadik.git git fetch --no-tags linusw-nomadik ux500-crypto-fb-stab git checkout 8b966d88af5f34992cc041b8c1a3aa8ff6e166d3 # save the config file mkdir build_dir && cp config build_dir/.config COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-12.1.0 make.cross W=1 O=build_dir ARCH=arm SHELL=/bin/bash If you fix the issue, kindly add following tag where applicable Reported-by: kernel test robot All errors (new ones prefixed by >>): In file included from drivers/crypto/ux500/hash/hash_core.c:39: >> drivers/crypto/ux500/hash/hash_alg.h:198:33: error: field 'fallback_req' has incomplete type 198 | struct skcipher_request fallback_req; | ^~~~~~~~~~~~ drivers/crypto/ux500/hash/hash_core.c: In function 'ux500_hash_init': >> drivers/crypto/ux500/hash/hash_core.c:409:58: error: passing argument 2 of 'ahash_request_set_tfm' from incompatible pointer type [-Werror=incompatible-pointer-types] 409 | ahash_request_set_tfm(&req_ctx->fallback_req, ctx->fallback_tfm); | ~~~^~~~~~~~~~~~~~ | | | struct crypto_skcipher * In file included from include/crypto/internal/hash.h:12, from drivers/crypto/ux500/hash/hash_core.c:33: include/crypto/hash.h:582:63: note: expected 'struct crypto_ahash *' but argument is of type 'struct crypto_skcipher *' 582 | struct crypto_ahash *tfm) | ~~~~~~~~~~~~~~~~~~~~~^~~ In file included from include/linux/device.h:15, from include/linux/amba/bus.h:15, from drivers/crypto/ux500/hash/hash_core.c:16: drivers/crypto/ux500/hash/hash_core.c: In function 'hash_setkey': >> drivers/crypto/ux500/hash/hash_core.c:1059:28: error: passing argument 1 of '_dev_err' from incompatible pointer type [-Werror=incompatible-pointer-types] 1059 | dev_err(ctx->device, "shash init error ret=%d\n", ret); | ~~~^~~~~~~~ | | | struct hash_device_data * include/linux/dev_printk.h:110:25: note: in definition of macro 'dev_printk_index_wrap' 110 | _p_func(dev, fmt, ##__VA_ARGS__); \ | ^~~ drivers/crypto/ux500/hash/hash_core.c:1059:17: note: in expansion of macro 'dev_err' 1059 | dev_err(ctx->device, "shash init error ret=%d\n", ret); | ^~~~~~~ include/linux/dev_printk.h:50:36: note: expected 'const struct device *' but argument is of type 'struct hash_device_data *' 50 | void _dev_err(const struct device *dev, const char *fmt, ...); | ~~~~~~~~~~~~~~~~~~~~~^~~ drivers/crypto/ux500/hash/hash_core.c:1064:28: error: passing argument 1 of '_dev_err' from incompatible pointer type [-Werror=incompatible-pointer-types] 1064 | dev_err(ctx->device, "shash finup error\n"); | ~~~^~~~~~~~ | | | struct hash_device_data * include/linux/dev_printk.h:110:25: note: in definition of macro 'dev_printk_index_wrap' 110 | _p_func(dev, fmt, ##__VA_ARGS__); \ | ^~~ drivers/crypto/ux500/hash/hash_core.c:1064:17: note: in expansion of macro 'dev_err' 1064 | dev_err(ctx->device, "shash finup error\n"); | ^~~~~~~ include/linux/dev_printk.h:50:36: note: expected 'const struct device *' but argument is of type 'struct hash_device_data *' 50 | void _dev_err(const struct device *dev, const char *fmt, ...); | ~~~~~~~~~~~~~~~~~~~~~^~~ drivers/crypto/ux500/hash/hash_core.c: In function 'hash_cra_init': >> drivers/crypto/ux500/hash/hash_core.c:1320:27: error: assignment to 'struct crypto_skcipher *' from incompatible pointer type 'struct crypto_ahash *' [-Werror=incompatible-pointer-types] 1320 | ctx->fallback_tfm = crypto_alloc_ahash(crypto_tfm_alg_name(tfm), 0, | ^ drivers/crypto/ux500/hash/hash_core.c:1323:28: error: passing argument 1 of '_dev_err' from incompatible pointer type [-Werror=incompatible-pointer-types] 1323 | dev_err(ctx->device, "fallback driver could no be loaded\n"); | ~~~^~~~~~~~ | | | struct hash_device_data * include/linux/dev_printk.h:110:25: note: in definition of macro 'dev_printk_index_wrap' 110 | _p_func(dev, fmt, ##__VA_ARGS__); \ | ^~~ drivers/crypto/ux500/hash/hash_core.c:1323:17: note: in expansion of macro 'dev_err' 1323 | dev_err(ctx->device, "fallback driver could no be loaded\n"); | ^~~~~~~ include/linux/dev_printk.h:50:36: note: expected 'const struct device *' but argument is of type 'struct hash_device_data *' 50 | void _dev_err(const struct device *dev, const char *fmt, ...); | ~~~~~~~~~~~~~~~~~~~~~^~~ >> drivers/crypto/ux500/hash/hash_core.c:1329:58: error: passing argument 1 of 'crypto_ahash_reqsize' from incompatible pointer type [-Werror=incompatible-pointer-types] 1329 | crypto_ahash_reqsize(ctx->fallback_tfm)); | ~~~^~~~~~~~~~~~~~ | | | struct crypto_skcipher * include/crypto/hash.h:413:70: note: expected 'struct crypto_ahash *' but argument is of type 'struct crypto_skcipher *' 413 | static inline unsigned int crypto_ahash_reqsize(struct crypto_ahash *tfm) | ~~~~~~~~~~~~~~~~~~~~~^~~ In file included from include/linux/string.h:253, from include/linux/bitmap.h:11, from include/linux/cpumask.h:12, from include/linux/smp.h:13, from include/linux/lockdep.h:14, from include/linux/mutex.h:17, from include/linux/notifier.h:14, from include/linux/clk.h:14, from include/linux/amba/bus.h:14: >> drivers/crypto/ux500/hash/hash_core.c:1331:79: error: invalid use of undefined type 'struct crypto_skcipher' 1331 | memcpy(hash_alg->fbname, crypto_tfm_alg_driver_name(&ctx->fallback_tfm->base), | ^~ include/linux/fortify-string.h:376:52: note: in definition of macro '__fortify_memcpy_chk' 376 | fortify_memcpy_chk(__fortify_size, p_size, q_size, \ | ^~~~~~ drivers/crypto/ux500/hash/hash_core.c:1331:9: note: in expansion of macro 'memcpy' 1331 | memcpy(hash_alg->fbname, crypto_tfm_alg_driver_name(&ctx->fallback_tfm->base), | ^~~~~~ >> drivers/crypto/ux500/hash/hash_core.c:1331:79: error: invalid use of undefined type 'struct crypto_skcipher' 1331 | memcpy(hash_alg->fbname, crypto_tfm_alg_driver_name(&ctx->fallback_tfm->base), | ^~ include/linux/fortify-string.h:377:42: note: in definition of macro '__fortify_memcpy_chk' 377 | p_size_field, q_size_field, #op); \ | ^~~~~~~~~~~~ drivers/crypto/ux500/hash/hash_core.c:1331:9: note: in expansion of macro 'memcpy' 1331 | memcpy(hash_alg->fbname, crypto_tfm_alg_driver_name(&ctx->fallback_tfm->base), | ^~~~~~ >> drivers/crypto/ux500/hash/hash_core.c:1331:79: error: invalid use of undefined type 'struct crypto_skcipher' 1331 | memcpy(hash_alg->fbname, crypto_tfm_alg_driver_name(&ctx->fallback_tfm->base), | ^~ include/linux/fortify-string.h:378:30: note: in definition of macro '__fortify_memcpy_chk' 378 | __underlying_##op(p, q, __fortify_size); \ | ^ drivers/crypto/ux500/hash/hash_core.c:1331:9: note: in expansion of macro 'memcpy' 1331 | memcpy(hash_alg->fbname, crypto_tfm_alg_driver_name(&ctx->fallback_tfm->base), | ^~~~~~ drivers/crypto/ux500/hash/hash_core.c: In function 'hash_cra_exit': >> drivers/crypto/ux500/hash/hash_core.c:1347:30: error: passing argument 1 of 'crypto_free_ahash' from incompatible pointer type [-Werror=incompatible-pointer-types] 1347 | crypto_free_ahash(ctx->fallback_tfm); | ~~~^~~~~~~~~~~~~~ | | | struct crypto_skcipher * include/crypto/hash.h:287:59: note: expected 'struct crypto_ahash *' but argument is of type 'struct crypto_skcipher *' 287 | static inline void crypto_free_ahash(struct crypto_ahash *tfm) | ~~~~~~~~~~~~~~~~~~~~~^~~ drivers/crypto/ux500/hash/hash_core.c: At top level: >> drivers/crypto/ux500/hash/hash_core.c:1366:65: error: expected expression before ',' token 1366 | .cra_flags = CRYPTO_ALG_ASYNC | , | ^ cc1: some warnings being treated as errors vim +/fallback_req +198 drivers/crypto/ux500/hash/hash_alg.h 175 176 /** 177 * struct hash_ctx - The request context used for hash calculations. 178 * @buffer: Working buffer for messages going to the hardware. 179 * @length: Length of the part of message hashed so far (floor(N/64) * 64). 180 * @index: Valid number of bytes in buffer (N % 64). 181 * @state: The state of the current calculations. 182 * @dma_mode: Used in special cases (workaround), e.g. need to change to 183 * cpu mode, if not supported/working in dma mode. 184 * @hw_initialized: Indicates if hardware is initialized for new operations. 185 * @fallback_req: Request struct for invoking the fallback skcipher TFM 186 * 187 * WARNING: "index" is the member of the structure, to be sure that "buffer" 188 * is aligned on a 4-bytes boundary. This is highly implementation dependent 189 * and MUST be checked whenever this code is ported on new platforms. 190 */ 191 struct hash_req_ctx { 192 u32 buffer[HASH_BLOCK_SIZE / sizeof(u32)]; 193 u64 length; 194 u8 index; 195 bool dma_mode; 196 bool hw_initialized; 197 /* Keep this as the end of the struct for referencing by tail */ > 198 struct skcipher_request fallback_req; 199 }; 200 -- 0-DAY CI Kernel Test Service https://01.org/lkp _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel