public inbox for linux-crypto@vger.kernel.org
 help / color / mirror / Atom feed
From: kbuild test robot <lkp@intel.com>
To: Tadeusz Struk <tadeusz.struk@intel.com>
Cc: kbuild-all@01.org, herbert@gondor.apana.org.au,
	tadeusz.struk@intel.com, linux-kernel@vger.kernel.org,
	dhowells@redhat.com, linux-security-module@vger.kernel.org,
	linux-crypto@vger.kernel.org, zohar@linux.vnet.ibm.com
Subject: Re: [PATCH v3 1/2] crypto: KEYS: convert public key to the akcipher api
Date: Wed, 23 Dec 2015 13:38:56 +0800	[thread overview]
Message-ID: <201512231325.aeSfwxyN%fengguang.wu@intel.com> (raw)
In-Reply-To: <20151223051245.1858.34571.stgit@tstruk-mobl1>

[-- Attachment #1: Type: text/plain, Size: 3476 bytes --]

Hi Tadeusz,

[auto build test ERROR on cryptodev/master]
[also build test ERROR on v4.4-rc6 next-20151223]

url:    https://github.com/0day-ci/linux/commits/Tadeusz-Struk/crypto-KEYS-convert-public-key-to-akcipher-api/20151223-132001
base:   https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git master
config: xtensa-allyesconfig (attached as .config)
reproduce:
        wget https://git.kernel.org/cgit/linux/kernel/git/wfg/lkp-tests.git/plain/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # save the attached .config to linux build tree
        make.cross ARCH=xtensa 

Note: the linux-review/Tadeusz-Struk/crypto-KEYS-convert-public-key-to-akcipher-api/20151223-132001 HEAD 06fa55a0feec438fdc649cdac682af7ab99f8099 builds fine.
      It only hurts bisectibility.

All errors (new ones prefixed by >>):

   security/integrity/digsig_asymmetric.c: In function 'asymmetric_verify':
>> security/integrity/digsig_asymmetric.c:95:5: error: 'struct public_key_signature' has no member named 'nr_mpi'
     pks.nr_mpi = 1;
        ^
>> security/integrity/digsig_asymmetric.c:96:5: error: 'struct public_key_signature' has no member named 'rsa'
     pks.rsa.s = mpi_read_raw_data(hdr->sig, siglen);
        ^
>> security/integrity/digsig_asymmetric.c:96:2: error: implicit declaration of function 'mpi_read_raw_data' [-Werror=implicit-function-declaration]
     pks.rsa.s = mpi_read_raw_data(hdr->sig, siglen);
     ^
   security/integrity/digsig_asymmetric.c:98:9: error: 'struct public_key_signature' has no member named 'rsa'
     if (pks.rsa.s)
            ^
>> security/integrity/digsig_asymmetric.c:101:2: error: implicit declaration of function 'mpi_free' [-Werror=implicit-function-declaration]
     mpi_free(pks.rsa.s);
     ^
   security/integrity/digsig_asymmetric.c:101:14: error: 'struct public_key_signature' has no member named 'rsa'
     mpi_free(pks.rsa.s);
                 ^
   cc1: some warnings being treated as errors

vim +95 security/integrity/digsig_asymmetric.c

e0751257 Dmitry Kasatkin 2013-02-07   89  
e0751257 Dmitry Kasatkin 2013-02-07   90  	memset(&pks, 0, sizeof(pks));
e0751257 Dmitry Kasatkin 2013-02-07   91  
e0751257 Dmitry Kasatkin 2013-02-07   92  	pks.pkey_hash_algo = hdr->hash_algo;
e0751257 Dmitry Kasatkin 2013-02-07   93  	pks.digest = (u8 *)data;
e0751257 Dmitry Kasatkin 2013-02-07   94  	pks.digest_size = datalen;
e0751257 Dmitry Kasatkin 2013-02-07  @95  	pks.nr_mpi = 1;
e0751257 Dmitry Kasatkin 2013-02-07  @96  	pks.rsa.s = mpi_read_raw_data(hdr->sig, siglen);
e0751257 Dmitry Kasatkin 2013-02-07   97  
e0751257 Dmitry Kasatkin 2013-02-07   98  	if (pks.rsa.s)
e0751257 Dmitry Kasatkin 2013-02-07   99  		ret = verify_signature(key, &pks);
e0751257 Dmitry Kasatkin 2013-02-07  100  
e0751257 Dmitry Kasatkin 2013-02-07 @101  	mpi_free(pks.rsa.s);
e0751257 Dmitry Kasatkin 2013-02-07  102  	key_put(key);
e0751257 Dmitry Kasatkin 2013-02-07  103  	pr_debug("%s() = %d\n", __func__, ret);
e0751257 Dmitry Kasatkin 2013-02-07  104  	return ret;

:::::: The code at line 95 was first introduced by commit
:::::: e0751257a64ea10cca96ccb06522bfb10e36cb5b ima: digital signature verification using asymmetric keys

:::::: TO: Dmitry Kasatkin <dmitry.kasatkin@intel.com>
:::::: CC: Mimi Zohar <zohar@linux.vnet.ibm.com>

---
0-DAY kernel test infrastructure                Open Source Technology Center
https://lists.01.org/pipermail/kbuild-all                   Intel Corporation

[-- Attachment #2: .config.gz --]
[-- Type: application/octet-stream, Size: 43276 bytes --]

  reply	other threads:[~2015-12-23  5:38 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-12-23  5:12 [PATCH v3 0/2] crypto: KEYS: convert public key to akcipher api Tadeusz Struk
2015-12-23  5:12 ` [PATCH v3 1/2] crypto: KEYS: convert public key to the " Tadeusz Struk
2015-12-23  5:38   ` kbuild test robot [this message]
2015-12-23  5:12 ` [PATCH v3 2/2] integrity: convert digsig to " Tadeusz Struk

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=201512231325.aeSfwxyN%fengguang.wu@intel.com \
    --to=lkp@intel.com \
    --cc=dhowells@redhat.com \
    --cc=herbert@gondor.apana.org.au \
    --cc=kbuild-all@01.org \
    --cc=linux-crypto@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-security-module@vger.kernel.org \
    --cc=tadeusz.struk@intel.com \
    --cc=zohar@linux.vnet.ibm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox