lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <201811070256.7Ft2VSGA%fengguang.wu@intel.com>
Date:   Wed, 7 Nov 2018 02:25:10 +0800
From:   kbuild test robot <lkp@...el.com>
To:     Sascha Hauer <s.hauer@...gutronix.de>
Cc:     kbuild-all@...org, linux-kernel@...r.kernel.org,
        Richard Weinberger <richard@....at>
Subject: fs/ubifs/auth.c:249:2: error: implicit declaration of function
 'request_key'

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head:   8053e5b93eca9b011f7b79bb019bf1eeaaf96c4b
commit: d8a22773a12c6d78ee758c9e530f3a488bb7cb29 ubifs: Enable authentication support
date:   2 weeks ago
config: i386-randconfig-h1-11070135 (attached as .config)
compiler: gcc-4.9 (Debian 4.9.4-2) 4.9.4
reproduce:
        git checkout d8a22773a12c6d78ee758c9e530f3a488bb7cb29
        # save the attached .config to linux build tree
        make ARCH=i386 

All error/warnings (new ones prefixed by >>):

   fs/ubifs/auth.c: In function 'ubifs_init_authentication':
>> fs/ubifs/auth.c:249:2: error: implicit declaration of function 'request_key' [-Werror=implicit-function-declaration]
     keyring_key = request_key(&key_type_logon, c->auth_key_name, NULL);
     ^
>> fs/ubifs/auth.c:249:29: error: 'key_type_logon' undeclared (first use in this function)
     keyring_key = request_key(&key_type_logon, c->auth_key_name, NULL);
                                ^
   fs/ubifs/auth.c:249:29: note: each undeclared identifier is reported only once for each function it appears in
>> fs/ubifs/auth.c:257:24: error: dereferencing pointer to incomplete type
     down_read(&keyring_key->sem);
                           ^
   In file included from arch/x86/include/asm/atomic.h:5:0,
                    from include/linux/atomic.h:7,
                    from include/linux/crypto.h:20,
                    from fs/ubifs/auth.c:12:
   fs/ubifs/auth.c:259:17: error: dereferencing pointer to incomplete type
     if (keyring_key->type != &key_type_logon) {
                    ^
   include/linux/compiler.h:58:30: note: in definition of macro '__trace_if'
     if (__builtin_constant_p(!!(cond)) ? !!(cond) :   \
                                 ^
>> fs/ubifs/auth.c:259:2: note: in expansion of macro 'if'
     if (keyring_key->type != &key_type_logon) {
     ^
   fs/ubifs/auth.c:259:17: error: dereferencing pointer to incomplete type
     if (keyring_key->type != &key_type_logon) {
                    ^
   include/linux/compiler.h:58:42: note: in definition of macro '__trace_if'
     if (__builtin_constant_p(!!(cond)) ? !!(cond) :   \
                                             ^
>> fs/ubifs/auth.c:259:2: note: in expansion of macro 'if'
     if (keyring_key->type != &key_type_logon) {
     ^
   fs/ubifs/auth.c:259:17: error: dereferencing pointer to incomplete type
     if (keyring_key->type != &key_type_logon) {
                    ^
   include/linux/compiler.h:69:16: note: in definition of macro '__trace_if'
      ______r = !!(cond);     \
                   ^
>> fs/ubifs/auth.c:259:2: note: in expansion of macro 'if'
     if (keyring_key->type != &key_type_logon) {
     ^
>> fs/ubifs/auth.c:265:2: error: implicit declaration of function 'user_key_payload_locked' [-Werror=implicit-function-declaration]
     ukp = user_key_payload_locked(keyring_key);
     ^
>> fs/ubifs/auth.c:265:6: warning: assignment makes pointer from integer without a cast
     ukp = user_key_payload_locked(keyring_key);
         ^
   fs/ubifs/auth.c:304:44: error: dereferencing pointer to incomplete type
     err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen);
                                               ^
   fs/ubifs/auth.c:304:55: error: dereferencing pointer to incomplete type
     err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen);
                                                          ^
   fs/ubifs/auth.c:323:22: error: dereferencing pointer to incomplete type
     up_read(&keyring_key->sem);
                         ^
   cc1: some warnings being treated as errors

vim +/request_key +249 fs/ubifs/auth.c

49525e5e Sascha Hauer 2018-09-07  219  
49525e5e Sascha Hauer 2018-09-07  220  /**
49525e5e Sascha Hauer 2018-09-07  221   * ubifs_init_authentication - initialize UBIFS authentication support
49525e5e Sascha Hauer 2018-09-07  222   * @c: UBIFS file-system description object
49525e5e Sascha Hauer 2018-09-07  223   *
49525e5e Sascha Hauer 2018-09-07  224   * This function returns 0 for success or a negative error code otherwise.
49525e5e Sascha Hauer 2018-09-07  225   */
49525e5e Sascha Hauer 2018-09-07  226  int ubifs_init_authentication(struct ubifs_info *c)
49525e5e Sascha Hauer 2018-09-07  227  {
49525e5e Sascha Hauer 2018-09-07  228  	struct key *keyring_key;
49525e5e Sascha Hauer 2018-09-07  229  	const struct user_key_payload *ukp;
49525e5e Sascha Hauer 2018-09-07  230  	int err;
49525e5e Sascha Hauer 2018-09-07  231  	char hmac_name[CRYPTO_MAX_ALG_NAME];
49525e5e Sascha Hauer 2018-09-07  232  
49525e5e Sascha Hauer 2018-09-07  233  	if (!c->auth_hash_name) {
49525e5e Sascha Hauer 2018-09-07  234  		ubifs_err(c, "authentication hash name needed with authentication");
49525e5e Sascha Hauer 2018-09-07  235  		return -EINVAL;
49525e5e Sascha Hauer 2018-09-07  236  	}
49525e5e Sascha Hauer 2018-09-07  237  
49525e5e Sascha Hauer 2018-09-07  238  	c->auth_hash_algo = match_string(hash_algo_name, HASH_ALGO__LAST,
49525e5e Sascha Hauer 2018-09-07  239  					 c->auth_hash_name);
49525e5e Sascha Hauer 2018-09-07  240  	if ((int)c->auth_hash_algo < 0) {
49525e5e Sascha Hauer 2018-09-07  241  		ubifs_err(c, "Unknown hash algo %s specified",
49525e5e Sascha Hauer 2018-09-07  242  			  c->auth_hash_name);
49525e5e Sascha Hauer 2018-09-07  243  		return -EINVAL;
49525e5e Sascha Hauer 2018-09-07  244  	}
49525e5e Sascha Hauer 2018-09-07  245  
49525e5e Sascha Hauer 2018-09-07  246  	snprintf(hmac_name, CRYPTO_MAX_ALG_NAME, "hmac(%s)",
49525e5e Sascha Hauer 2018-09-07  247  		 c->auth_hash_name);
49525e5e Sascha Hauer 2018-09-07  248  
49525e5e Sascha Hauer 2018-09-07 @249  	keyring_key = request_key(&key_type_logon, c->auth_key_name, NULL);
49525e5e Sascha Hauer 2018-09-07  250  
49525e5e Sascha Hauer 2018-09-07  251  	if (IS_ERR(keyring_key)) {
49525e5e Sascha Hauer 2018-09-07  252  		ubifs_err(c, "Failed to request key: %ld",
49525e5e Sascha Hauer 2018-09-07  253  			  PTR_ERR(keyring_key));
49525e5e Sascha Hauer 2018-09-07  254  		return PTR_ERR(keyring_key);
49525e5e Sascha Hauer 2018-09-07  255  	}
49525e5e Sascha Hauer 2018-09-07  256  
49525e5e Sascha Hauer 2018-09-07 @257  	down_read(&keyring_key->sem);
49525e5e Sascha Hauer 2018-09-07  258  
49525e5e Sascha Hauer 2018-09-07 @259  	if (keyring_key->type != &key_type_logon) {
49525e5e Sascha Hauer 2018-09-07  260  		ubifs_err(c, "key type must be logon");
49525e5e Sascha Hauer 2018-09-07  261  		err = -ENOKEY;
49525e5e Sascha Hauer 2018-09-07  262  		goto out;
49525e5e Sascha Hauer 2018-09-07  263  	}
49525e5e Sascha Hauer 2018-09-07  264  
49525e5e Sascha Hauer 2018-09-07 @265  	ukp = user_key_payload_locked(keyring_key);
49525e5e Sascha Hauer 2018-09-07  266  	if (!ukp) {
49525e5e Sascha Hauer 2018-09-07  267  		/* key was revoked before we acquired its semaphore */
49525e5e Sascha Hauer 2018-09-07  268  		err = -EKEYREVOKED;
49525e5e Sascha Hauer 2018-09-07  269  		goto out;
49525e5e Sascha Hauer 2018-09-07  270  	}
49525e5e Sascha Hauer 2018-09-07  271  
49525e5e Sascha Hauer 2018-09-07  272  	c->hash_tfm = crypto_alloc_shash(c->auth_hash_name, 0,
49525e5e Sascha Hauer 2018-09-07  273  					 CRYPTO_ALG_ASYNC);
49525e5e Sascha Hauer 2018-09-07  274  	if (IS_ERR(c->hash_tfm)) {
49525e5e Sascha Hauer 2018-09-07  275  		err = PTR_ERR(c->hash_tfm);
49525e5e Sascha Hauer 2018-09-07  276  		ubifs_err(c, "Can not allocate %s: %d",
49525e5e Sascha Hauer 2018-09-07  277  			  c->auth_hash_name, err);
49525e5e Sascha Hauer 2018-09-07  278  		goto out;
49525e5e Sascha Hauer 2018-09-07  279  	}
49525e5e Sascha Hauer 2018-09-07  280  
49525e5e Sascha Hauer 2018-09-07  281  	c->hash_len = crypto_shash_digestsize(c->hash_tfm);
49525e5e Sascha Hauer 2018-09-07  282  	if (c->hash_len > UBIFS_HASH_ARR_SZ) {
49525e5e Sascha Hauer 2018-09-07  283  		ubifs_err(c, "hash %s is bigger than maximum allowed hash size (%d > %d)",
49525e5e Sascha Hauer 2018-09-07  284  			  c->auth_hash_name, c->hash_len, UBIFS_HASH_ARR_SZ);
49525e5e Sascha Hauer 2018-09-07  285  		err = -EINVAL;
49525e5e Sascha Hauer 2018-09-07  286  		goto out_free_hash;
49525e5e Sascha Hauer 2018-09-07  287  	}
49525e5e Sascha Hauer 2018-09-07  288  
49525e5e Sascha Hauer 2018-09-07  289  	c->hmac_tfm = crypto_alloc_shash(hmac_name, 0, CRYPTO_ALG_ASYNC);
49525e5e Sascha Hauer 2018-09-07  290  	if (IS_ERR(c->hmac_tfm)) {
49525e5e Sascha Hauer 2018-09-07  291  		err = PTR_ERR(c->hmac_tfm);
49525e5e Sascha Hauer 2018-09-07  292  		ubifs_err(c, "Can not allocate %s: %d", hmac_name, err);
49525e5e Sascha Hauer 2018-09-07  293  		goto out_free_hash;
49525e5e Sascha Hauer 2018-09-07  294  	}
49525e5e Sascha Hauer 2018-09-07  295  
49525e5e Sascha Hauer 2018-09-07  296  	c->hmac_desc_len = crypto_shash_digestsize(c->hmac_tfm);
49525e5e Sascha Hauer 2018-09-07  297  	if (c->hmac_desc_len > UBIFS_HMAC_ARR_SZ) {
49525e5e Sascha Hauer 2018-09-07  298  		ubifs_err(c, "hmac %s is bigger than maximum allowed hmac size (%d > %d)",
49525e5e Sascha Hauer 2018-09-07  299  			  hmac_name, c->hmac_desc_len, UBIFS_HMAC_ARR_SZ);
49525e5e Sascha Hauer 2018-09-07  300  		err = -EINVAL;
49525e5e Sascha Hauer 2018-09-07  301  		goto out_free_hash;
49525e5e Sascha Hauer 2018-09-07  302  	}
49525e5e Sascha Hauer 2018-09-07  303  
49525e5e Sascha Hauer 2018-09-07  304  	err = crypto_shash_setkey(c->hmac_tfm, ukp->data, ukp->datalen);
49525e5e Sascha Hauer 2018-09-07  305  	if (err)
49525e5e Sascha Hauer 2018-09-07  306  		goto out_free_hmac;
49525e5e Sascha Hauer 2018-09-07  307  
49525e5e Sascha Hauer 2018-09-07  308  	c->authenticated = true;
49525e5e Sascha Hauer 2018-09-07  309  
49525e5e Sascha Hauer 2018-09-07  310  	c->log_hash = ubifs_hash_get_desc(c);
49525e5e Sascha Hauer 2018-09-07  311  	if (IS_ERR(c->log_hash))
49525e5e Sascha Hauer 2018-09-07  312  		goto out_free_hmac;
49525e5e Sascha Hauer 2018-09-07  313  
49525e5e Sascha Hauer 2018-09-07  314  	err = 0;
49525e5e Sascha Hauer 2018-09-07  315  
49525e5e Sascha Hauer 2018-09-07  316  out_free_hmac:
49525e5e Sascha Hauer 2018-09-07  317  	if (err)
49525e5e Sascha Hauer 2018-09-07  318  		crypto_free_shash(c->hmac_tfm);
49525e5e Sascha Hauer 2018-09-07  319  out_free_hash:
49525e5e Sascha Hauer 2018-09-07  320  	if (err)
49525e5e Sascha Hauer 2018-09-07  321  		crypto_free_shash(c->hash_tfm);
49525e5e Sascha Hauer 2018-09-07  322  out:
49525e5e Sascha Hauer 2018-09-07  323  	up_read(&keyring_key->sem);
49525e5e Sascha Hauer 2018-09-07  324  	key_put(keyring_key);
49525e5e Sascha Hauer 2018-09-07  325  
49525e5e Sascha Hauer 2018-09-07  326  	return err;
49525e5e Sascha Hauer 2018-09-07  327  }
49525e5e Sascha Hauer 2018-09-07  328  

:::::: The code at line 249 was first introduced by commit
:::::: 49525e5eecca5e1b4a83ac217868e8d8b843539f ubifs: Add helper functions for authentication support

:::::: TO: Sascha Hauer <s.hauer@...gutronix.de>
:::::: CC: Richard Weinberger <richard@....at>

---
0-DAY kernel test infrastructure                Open Source Technology Center
https://lists.01.org/pipermail/kbuild-all                   Intel Corporation

Download attachment ".config.gz" of type "application/gzip" (27455 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ