Received: by 2002:a05:7412:b995:b0:f9:9502:5bb8 with SMTP id it21csp1989552rdb; Sun, 24 Dec 2023 10:55:08 -0800 (PST) X-Google-Smtp-Source: AGHT+IE7DBv9GYGMNozcebzc0tSZTuqdZsJeOxKoNmZbPmxpObWActYvBN3yYNpFwsSrOtm/sbh+ X-Received: by 2002:a17:906:fc08:b0:a26:eea0:50b7 with SMTP id ov8-20020a170906fc0800b00a26eea050b7mr705851ejb.24.1703444108232; Sun, 24 Dec 2023 10:55:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703444108; cv=none; d=google.com; s=arc-20160816; b=hMwSXdGAJ+NvAOJFqZBDhTmVdNNz06AJQAsGaIZjl+9Pb9Cz4FjaKnxRvkqgGAo3DG Edl9XtKocTGiCBrm+hKSyYfmKnotvfoF+tj06r77UaOcV0UUoBq9dZ7GYonbABYVC+4L o6YYwkwuwd+VgJQNvV6UxemE3QvRhZEv3uT+EC63HKwIatlzwofcF8iORosrKzI2KnMU z/dTiV0mEmxWglnO8b9cBWoXpYdqYt8O3KbshtxRJ32ePOFdgIG4zvWS7AnSM9h9Z8f0 FgIfcAUIbX/gBJwQIVmUWh5bX2ZznBdB2FzNlJLT2k9hWG2NSVpPAOV16fkwMdzPqi3E vJGw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=DnenmJK4I905otBpxMf5ItJ0/R3PVyIwsjREFyUHbUM=; fh=qhTuwQCACF6D8sFoHYvM4ITMEVi80WEe05wMlFY9Eso=; b=YSruyh9O5G7W1soe5N56YoP2mdg42kFHzJ8YUhPYnugldHsKOadK/2c78u4KASs6hw 8wbtIYYJGuIoGkug67lYcaOxieX3OBMQLfeeXFw9hnI3eY9C2wN4f/jYcYUKT4p7/lDI 3+RBvjsWqIYZLQAy+G/b3rTmFbpjLvEWEBun+JuJ6y8YrjEVMhIONef12bq8cy1JtMc9 j5K3U35q8BXmzdZ3IcQS9aYoAMjz22/xX1u9ZwvIf0tHe/se7yZSk1iyTQAciDd5Ct6k lUBt7IMGlJXSXxYvXMm1cthRLdXmrLobKdD4alLl2bSwcTYzt50kPUctc/vmU0pNv/GX dbAA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=XDlNubcP; spf=pass (google.com: domain of linux-crypto+bounces-1016-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-crypto+bounces-1016-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id p23-20020a170906141700b00a23682b74d4si3609543ejc.941.2023.12.24.10.55.08 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 24 Dec 2023 10:55:08 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto+bounces-1016-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=XDlNubcP; spf=pass (google.com: domain of linux-crypto+bounces-1016-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-crypto+bounces-1016-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id E5E261F21752 for ; Sun, 24 Dec 2023 18:55:07 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 51717D28F; Sun, 24 Dec 2023 18:55:02 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=intel.com header.i=@intel.com header.b="XDlNubcP" X-Original-To: linux-crypto@vger.kernel.org Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0D674FBE8; Sun, 24 Dec 2023 18:54:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=intel.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1703444099; x=1734980099; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=QkRfWSWR/XMDhOsYtyqhQDrgzSxc71smIy67/8QzOS4=; b=XDlNubcPBAKkvsgn68yIY33Hf9fEEggOYSqaRZb8uvq7s+iKUlSfMR7T tNpQ/bUqwns131836znNJW5y++RzO+mDALQQHbSlm66KpTtEcbhur6AR7 E8gdu7SFesAtN8Q3ISZ0OaTsrf9PLXaG8b0oEAezx2Aw6QE33nxBeLujB 4rbLpFRYEl0eUEn7YjDyY6f5PmkUoDw4ad0YjEVjaSG7cqMpYH98Jpem4 X7F0A/O1/ue/xHXabJVEVukJ6AcJk8pUc1Eod8Gm0UFMfFxV7s60YzodN 3XtTfwmfLHnDseiJ9evw4vTcllTNeCuNhmi9TyjkRL+ERsegBIRdYk2J/ g==; X-IronPort-AV: E=McAfee;i="6600,9927,10934"; a="427414104" X-IronPort-AV: E=Sophos;i="6.04,301,1695711600"; d="scan'208";a="427414104" Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 24 Dec 2023 10:54:58 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10934"; a="848056972" X-IronPort-AV: E=Sophos;i="6.04,301,1695711600"; d="scan'208";a="848056972" Received: from lkp-server02.sh.intel.com (HELO b07ab15da5fe) ([10.239.97.151]) by fmsmga004.fm.intel.com with ESMTP; 24 Dec 2023 10:54:56 -0800 Received: from kbuild by b07ab15da5fe with local (Exim 4.96) (envelope-from ) id 1rHTcg-000CXN-1n; Sun, 24 Dec 2023 18:54:51 +0000 Date: Mon, 25 Dec 2023 02:54:48 +0800 From: kernel test robot To: Edward Adam Davis , syzbot+8ffb0839a24e9c6bfa76@syzkaller.appspotmail.com Cc: oe-kbuild-all@lists.linux.dev, davem@davemloft.net, herbert@gondor.apana.org.au, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com Subject: Re: [PATCH next] crypto: fix oob Read in arc4_crypt Message-ID: <202312250259.yyBgM27K-lkp@intel.com> References: Precedence: bulk X-Mailing-List: linux-crypto@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Hi Edward, kernel test robot noticed the following build warnings: [auto build test WARNING on next-20231222] url: https://github.com/intel-lab-lkp/linux/commits/Edward-Adam-Davis/crypto-fix-oob-Read-in-arc4_crypt/20231222-172845 base: next-20231222 patch link: https://lore.kernel.org/r/tencent_656D589558EA3EED8ACF3C79166F202E010A%40qq.com patch subject: [PATCH next] crypto: fix oob Read in arc4_crypt config: i386-buildonly-randconfig-003-20231224 (https://download.01.org/0day-ci/archive/20231225/202312250259.yyBgM27K-lkp@intel.com/config) compiler: gcc-12 (Debian 12.2.0-14) 12.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231225/202312250259.yyBgM27K-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202312250259.yyBgM27K-lkp@intel.com/ All warnings (new ones prefixed by >>): In file included from drivers/crypto/padlock-aes.c:13: >> include/crypto/internal/skcipher.h:27:33: warning: 'crypto_skcipher_type' defined but not used [-Wunused-const-variable=] 27 | static const struct crypto_type crypto_skcipher_type; | ^~~~~~~~~~~~~~~~~~~~ vim +/crypto_skcipher_type +27 include/crypto/internal/skcipher.h 24 25 struct aead_request; 26 struct rtattr; > 27 static const struct crypto_type crypto_skcipher_type; 28 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki