Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp868053imu; Wed, 9 Jan 2019 07:43:02 -0800 (PST) X-Google-Smtp-Source: ALg8bN7cKo3fWdn7dNO8PVPYQpp5hN/J+BC92ixuDfzYTSxB52xMVSGYrYF+vqJTmKEdIqIZl3zv X-Received: by 2002:a17:902:8541:: with SMTP id d1mr6587260plo.205.1547048582815; Wed, 09 Jan 2019 07:43:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547048582; cv=none; d=google.com; s=arc-20160816; b=gSKUQm8npFzt5k5ZDPEac07R6gTKJMWcxJcYH5+BZF50ZnxEPlfzxabGh7GxPNzxMx 41gBAej4nJT+nWdYy22mXlNpvsCXO5hyoT5BYK03VoMe0yEBXmzmR6aLtjmNrPgrjOsH 2IQygOXL5pGBc+RLVnPdK6T4p8NsnfDUX3Bz1JYe3RIU5XHMJ5ojtg4ZDTdG0/4HOhUg nbPKsZttykv/65UITI49+s6T6q1ehewgbuo7Ig8oyPDdd5s6jjF8jBQJ8o6hbHwr1opo MG3BQI8hVVZLcr9isaHt8cPPmKDs+5AZU8bEdHr6IIYrWi6dIfUVNr8luwxpdcdwrQdq NKDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=NVDVgbeeUDBP8rRzohcfvXjPtKc55BPpEFfYOHxCTSk=; b=cQRlp8wb230L6+twKuAlXbKmtO83bef2AwU7Czj/yEWToQswDVMbdhnpaF7Q3j0gbR qr6jitpvRTXP7XNAGz33hQ0symeasPhhinJr7pDV/SEL2Wq0kfO6CdYu8aGh++bVwPQx mB2LHDBfTtTPPEKyiO4aqn83p/+06oegc+mgqpG689g+R1fbOYX9qBVMulf9OI7M2iv3 3qI7S2ILj2ilWHNT7wr9vzBNVkCa5cZHYenp6C71mhUBcdxosYdQ9gatmRVpqg6nHY8n iQVic+K4YZwjTBesNNK0+4jDq7/iaHyY0+kUVw1t2+LZu4n4cxQwineKHisddaNefmmi jFIg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wQ7mqPW3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b36si63478797pgl.596.2019.01.09.07.42.47; Wed, 09 Jan 2019 07:43:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wQ7mqPW3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731837AbfAIOrC (ORCPT + 99 others); Wed, 9 Jan 2019 09:47:02 -0500 Received: from mail.kernel.org ([198.145.29.99]:49086 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731784AbfAIOrC (ORCPT ); Wed, 9 Jan 2019 09:47:02 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AB0AD206BA; Wed, 9 Jan 2019 14:47:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1547045221; bh=xxg+kR1oTq0IsGkU8vQtFaA1sUkZPLwuJWdGx+8let4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=wQ7mqPW34iT3EXU1eGGJtnzWiHAPM9i/arimWeam+4tsK90GYEKRTKmS7M1UfDGQH e7kwJ2cObYXlr+YUZnHuddKhJ1JONJmNwKCv1Zm9n7R0Kd/mIYdPbQ785WAlkkrNIa 1urk7tQktpMMedR9LwZnBKErYvYFQHBimVV4/ImI= Date: Wed, 9 Jan 2019 15:46:58 +0100 From: Greg Kroah-Hartman To: Jinpu Wang Cc: Guenter Roeck , LKML , torvalds@linux-foundation.org, akpm@linux-foundation.org, shuah@kernel.org, patches@kernelci.org, Ben Hutchings , lkft-triage@lists.linaro.org, "v3.14+, only the raid10 part" Subject: Re: [PATCH 4.14 000/101] 4.14.92-stable review Message-ID: <20190109144658.GF29274@kroah.com> References: <20190107105330.372621917@linuxfoundation.org> <20190108122542.GA4801@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.11.2 (2019-01-07) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 09, 2019 at 12:40:11PM +0100, Jinpu Wang wrote: > Greg Kroah-Hartman 于2019年1月8日周二 下午1:28写道: > > > > On Mon, Jan 07, 2019 at 08:59:12PM -0800, Guenter Roeck wrote: > > > > Should all now be fixed up. > > > > I hope, this set of releases has been a pain... > > > > greg k-h > > I had build failure below, looks related to 0fe69354b888 ("crypto: > testmgr - add AES-CFB tests") > In file included from crypto/testmgr.c:54:0: > crypto/testmgr.h:16039:3: error: unknown field 'ptext' specified in initializer > .ptext = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96" > ^ > crypto/testmgr.h:16047:3: error: unknown field 'ctext' specified in initializer > .ctext = "\x3b\x3f\xd9\x2e\xb7\x2d\xad\x20" > ^ > crypto/testmgr.h:16055:3: error: unknown field 'len' specified in initializer > .len = 64, > ^ > crypto/testmgr.h:16055:3: warning: initialization makes pointer from > integer without a cast > crypto/testmgr.h:16055:3: warning: (near initialization for > 'aes_cfb_tv_template[0].result') > crypto/testmgr.h:16063:3: error: unknown field 'ptext' specified in initializer > .ptext = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96" > ^ > crypto/testmgr.h:16071:3: error: unknown field 'ctext' specified in initializer > .ctext = "\xcd\xc8\x0d\x6f\xdd\xf1\x8c\xab" > ^ > crypto/testmgr.h:16079:3: error: unknown field 'len' specified in initializer > .len = 64, > ^ > crypto/testmgr.h:16079:3: warning: initialization makes pointer from > integer without a cast > crypto/testmgr.h:16079:3: warning: (near initialization for > 'aes_cfb_tv_template[1].result') > crypto/testmgr.h:16088:3: error: unknown field 'ptext' specified in initializer > .ptext = "\x6b\xc1\xbe\xe2\x2e\x40\x9f\x96" > ^ > crypto/testmgr.h:16096:3: error: unknown field 'ctext' specified in initializer > .ctext = "\xdc\x7e\x84\xbf\xda\x79\x16\x4b" > ^ > crypto/testmgr.h:16104:3: error: unknown field 'len' specified in initializer > .len = 64, > ^ > crypto/testmgr.h:16104:3: warning: initialization makes pointer from > integer without a cast > crypto/testmgr.h:16104:3: warning: (near initialization for > 'aes_cfb_tv_template[2].result') > CC [M] drivers/infiniband/sw/rxe/rxe_hw_counters.o > CC drivers/pci/pcie/portdrv_bus.o > CC lib/devres.o > crypto/testmgr.c:2633:4: error: unknown field 'vecs' specified in initializer > .cipher = __VECS(aes_cfb_tv_template) > ^ > crypto/testmgr.c:2633:4: warning: missing braces around initializer > [-Wmissing-braces] > crypto/testmgr.c:2633:4: warning: (near initialization for > 'alg_test_descs[36].suite.cipher.enc') [-Wmissing-braces] > crypto/testmgr.c:2633:4: error: unknown field 'count' specified in initializer > In file included from ./include/linux/kernel.h:15:0, > from ./include/linux/crypto.h:21, > from ./include/crypto/aead.h:16, > from crypto/testmgr.c:23: > ./include/linux/build_bug.h:30:45: warning: initialization makes > pointer from integer without a cast > #define BUILD_BUG_ON_ZERO(e) (sizeof(struct { int:(-!!(e)); })) > ^ > ./include/linux/compiler-gcc.h:65:28: note: in expansion of macro > 'BUILD_BUG_ON_ZERO' > #define __must_be_array(a) BUILD_BUG_ON_ZERO(__same_type((a), &(a)[0])) > ^ > ./include/linux/kernel.h:71:59: note: in expansion of macro '__must_be_array' > #define ARRAY_SIZE(arr) (sizeof(arr) / sizeof((arr)[0]) + __must_be_array(arr)) > ^ > crypto/testmgr.c:2347:43: note: in expansion of macro 'ARRAY_SIZE' > #define __VECS(tv) { .vecs = tv, .count = ARRAY_SIZE(tv) } > ^ > crypto/testmgr.c:2633:14: note: in expansion of macro '__VECS' > .cipher = __VECS(aes_cfb_tv_template) > ^ > ./include/linux/build_bug.h:30:45: warning: (near initialization for > 'alg_test_descs[36].suite.cipher.dec.vecs') > #define BUILD_BUG_ON_ZERO(e) (sizeof(struct { int:(-!!(e)); })) > ^ > ./include/linux/compiler-gcc.h:65:28: note: in expansion of macro > 'BUILD_BUG_ON_ZERO' > #define __must_be_array(a) BUILD_BUG_ON_ZERO(__same_type((a), &(a)[0])) > ^ > ./include/linux/kernel.h:71:59: note: in expansion of macro '__must_be_array' > #define ARRAY_SIZE(arr) (sizeof(arr) / sizeof((arr)[0]) + __must_be_array(arr)) > ^ > crypto/testmgr.c:2347:43: note: in expansion of macro 'ARRAY_SIZE' > #define __VECS(tv) { .vecs = tv, .count = ARRAY_SIZE(tv) } > ^ > crypto/testmgr.c:2633:14: note: in expansion of macro '__VECS' > .cipher = __VECS(aes_cfb_tv_template) > ^ > CC [M] drivers/md/dm-snap.o > scripts/Makefile.build:326: recipe for target 'crypto/testmgr.o' failed > make[4]: *** [crypto/testmgr.o] Error 1 > Makefile:1045: recipe for target 'crypto' failed > make[3]: *** [crypto] Error 2 You are right, that totally does not build. Odd that no one else's tests caught this :( Anyway, thanks for this, I've dropped the patch from 4.14.y now. greg k-h