From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 7D50FFD0048 for ; Sun, 1 Mar 2026 02:03:35 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id C72096B0005; Sat, 28 Feb 2026 21:03:34 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id C38B76B008C; Sat, 28 Feb 2026 21:03:34 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B8FD46B0092; Sat, 28 Feb 2026 21:03:34 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id A8C206B0005 for ; Sat, 28 Feb 2026 21:03:34 -0500 (EST) Received: from smtpin24.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 4A0761B7DB9 for ; Sun, 1 Mar 2026 02:03:34 +0000 (UTC) X-FDA: 84495847548.24.B80EE5B Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.11]) by imf11.hostedemail.com (Postfix) with ESMTP id B230840007 for ; Sun, 1 Mar 2026 02:03:31 +0000 (UTC) Authentication-Results: imf11.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=UXxZ5Mlj; spf=pass (imf11.hostedemail.com: domain of lkp@intel.com designates 192.198.163.11 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1772330612; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=D2oe/NPphjR+1HXsIVr66Tul4GDNbA9w0lyEYu/NhKE=; b=JNFYdXSaYiUftSM7jB+ajy7BdXEW2wsb45KDTxExqzkmXivDnnrAW2sz7Zt6UzWryNq/QX SSxbmTjleYA8xbVv8J4YQlIaBzYoE+o8S7eDyY9hyvz6FQiu+Jc8u0FOpNNRUwRogYEVoA xhpQPl/Wtgiu5Yvrkmod/QuPP2oNi44= ARC-Authentication-Results: i=1; imf11.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=UXxZ5Mlj; spf=pass (imf11.hostedemail.com: domain of lkp@intel.com designates 192.198.163.11 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1772330612; a=rsa-sha256; cv=none; b=pclcwxyycvkxh1tjoQEs133u3jISMmTmfm1kiyF3FHDCYhYHn0ZZ5O7z+GUz17v044yEBC BITIHv/C0VHiRR7yPUPsT+U6dXopAIiVdwyHJSB6l67CieZ2E6gOhKPMu+NY6gQuxNvwyt kyoPrduTwiqxAqH7oNTBemfE1WwnYcw= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1772330612; x=1803866612; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=KZzP/JecF27xHHiJFhTWIUfU3XREE4PimgnFsthN5/A=; b=UXxZ5Mljfw9bG8HFBo4YD7nTzX7NXuwFNGnt4vPdLkCPRQG1hJr9mNgt EFMAeRFwbvR48DPujzDw0KPt/1S+eRNYKMbhw9+jDzxKFaNHu7QJz9GBO 7ZlrVV9h46ejN/MQoInbrW55R+eK+x9AkwJzEgTJRzQbbmpb1zYixJmfW QoW/xVonu9hk09BT0dxZL6Xd0uWDsGB7EhKC/deIX1UYJ9eyDNSSiWpdB 8qXB8A8KYOrSpax8JHdVdsNZVzUVHRKMCLERLE8/YvECLnvyNau8QtHQk dT/LuceAMlYbgnlnBjcwerbKXJxtobUeNrsQU51OhesXnnujsdf5e4ZKh Q==; X-CSE-ConnectionGUID: /R/SD9JERiylOBb8lQEUtA== X-CSE-MsgGUID: IKHte7ADQ/2Zpa9W713JrQ== X-IronPort-AV: E=McAfee;i="6800,10657,11715"; a="84012018" X-IronPort-AV: E=Sophos;i="6.21,317,1763452800"; d="scan'208";a="84012018" Received: from fmviesa004.fm.intel.com ([10.60.135.144]) by fmvoesa105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Feb 2026 18:03:30 -0800 X-CSE-ConnectionGUID: 2F9CqOx2TE6GYuD7zyqyCQ== X-CSE-MsgGUID: MU1ccFKrRu6sm8nt7mKVxw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.21,317,1763452800"; d="scan'208";a="220438890" Received: from lkp-server01.sh.intel.com (HELO 59784f1c7b2a) ([10.239.97.150]) by fmviesa004.fm.intel.com with ESMTP; 28 Feb 2026 18:03:26 -0800 Received: from kbuild by 59784f1c7b2a with local (Exim 4.98.2) (envelope-from ) id 1vwW9S-000000000rZ-2a4w; Sun, 01 Mar 2026 02:03:22 +0000 Date: Sun, 1 Mar 2026 10:02:29 +0800 From: kernel test robot To: Blaise Boscaccy , Jonathan Corbet , Paul Moore , James Morris , "Serge E. Hallyn" , =?iso-8859-1?Q?Micka=EBl_Sala=FCn?= , =?iso-8859-1?Q?G=FCnther?= Noack , "Dr. David Alan Gilbert" , Andrew Morton , James.Bottomley@hansenpartnership.com, dhowells@redhat.com, Fan Wu , Ryan Foster , linux-security-module@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org Cc: oe-kbuild-all@lists.linux.dev, Linux Memory Management List Subject: Re: [PATCH v2 07/10] security: Hornet LSM Message-ID: <202603010957.7JUXdjTd-lkp@intel.com> References: <20260227233930.2418522-8-bboscaccy@linux.microsoft.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20260227233930.2418522-8-bboscaccy@linux.microsoft.com> X-Rspamd-Server: rspam10 X-Rspamd-Queue-Id: B230840007 X-Stat-Signature: 6yqaciogjzyxsbfq5qfdfbrwox1z3kq3 X-Rspam-User: X-HE-Tag: 1772330611-388390 X-HE-Meta: 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 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi Blaise, kernel test robot noticed the following build errors: [auto build test ERROR on linus/master] [also build test ERROR on v7.0-rc1 next-20260227] [cannot apply to herbert-cryptodev-2.6/master herbert-crypto-2.6/master shuah-kselftest/next shuah-kselftest/fixes] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Blaise-Boscaccy/certs-break-out-pkcs7-check-into-its-own-function/20260228-074528 base: linus/master patch link: https://lore.kernel.org/r/20260227233930.2418522-8-bboscaccy%40linux.microsoft.com patch subject: [PATCH v2 07/10] security: Hornet LSM config: um-randconfig-r133-20260228 (https://download.01.org/0day-ci/archive/20260301/202603010957.7JUXdjTd-lkp@intel.com/config) compiler: clang version 20.1.8 (https://github.com/llvm/llvm-project 87f0227cb60147a26a1eeb4fb06e3b505e9c7261) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20260301/202603010957.7JUXdjTd-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202603010957.7JUXdjTd-lkp@intel.com/ All errors (new ones prefixed by >>): In file included from security/hornet/hornet_lsm.c:10: In file included from include/linux/lsm_hooks.h:29: In file included from include/linux/security.h:35: In file included from include/linux/bpf.h:32: In file included from include/linux/memcontrol.h:13: In file included from include/linux/cgroup.h:27: In file included from include/linux/kernel_stat.h:8: In file included from include/linux/interrupt.h:11: In file included from include/linux/hardirq.h:11: In file included from arch/um/include/asm/hardirq.h:24: In file included from include/linux/irq.h:20: In file included from include/linux/io.h:12: In file included from arch/um/include/asm/io.h:24: include/asm-generic/io.h:1209:55: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic] 1209 | return (port > MMIO_UPPER_LIMIT) ? NULL : PCI_IOBASE + port; | ~~~~~~~~~~ ^ >> security/hornet/hornet_lsm.c:183:8: error: call to undeclared function 'verify_pkcs7_signature'; ISO C99 and later do not support implicit function declarations [-Wimplicit-function-declaration] 183 | err = verify_pkcs7_signature(prog->insnsi, prog->len * sizeof(struct bpf_insn), | ^ security/hornet/hornet_lsm.c:183:8: note: did you mean 'bpf_verify_pkcs7_signature'? include/linux/bpf.h:3624:5: note: 'bpf_verify_pkcs7_signature' declared here 3624 | int bpf_verify_pkcs7_signature(struct bpf_dynptr *data_p, | ^ >> security/hornet/hornet_lsm.c:197:6: error: call to undeclared function 'validate_pkcs7_trust'; ISO C99 and later do not support implicit function declarations [-Wimplicit-function-declaration] 197 | if (validate_pkcs7_trust(msg, VERIFY_USE_SECONDARY_KEYRING)) { | ^ 1 warning and 2 errors generated. vim +/verify_pkcs7_signature +183 security/hornet/hornet_lsm.c 153 154 static int hornet_check_program(struct bpf_prog *prog, union bpf_attr *attr, 155 struct bpf_token *token, bool is_kernel) 156 { 157 struct hornet_maps maps = {0}; 158 bpfptr_t usig = make_bpfptr(attr->signature, is_kernel); 159 struct pkcs7_message *msg; 160 struct hornet_parse_context *ctx; 161 void *sig; 162 int err; 163 const void *authattrs; 164 size_t authattrs_len; 165 166 if (!attr->signature) 167 return LSM_INT_VERDICT_UNSIGNED; 168 169 ctx = kzalloc(sizeof(struct hornet_parse_context), GFP_KERNEL); 170 if (!ctx) 171 return -ENOMEM; 172 173 maps.fd_array = make_bpfptr(attr->fd_array, is_kernel); 174 sig = kzalloc(attr->signature_size, GFP_KERNEL); 175 if (!sig) { 176 err = -ENOMEM; 177 goto out; 178 } 179 err = copy_from_bpfptr(sig, usig, attr->signature_size); 180 if (err != 0) 181 goto cleanup_sig; 182 > 183 err = verify_pkcs7_signature(prog->insnsi, prog->len * sizeof(struct bpf_insn), 184 sig, attr->signature_size, VERIFY_USE_SECONDARY_KEYRING, 185 VERIFYING_BPF_SIGNATURE, NULL, NULL); 186 if (err < 0) { 187 err = LSM_INT_VERDICT_BADSIG; 188 goto cleanup_sig; 189 } 190 191 msg = pkcs7_parse_message(sig, attr->signature_size); 192 if (IS_ERR(msg)) { 193 err = LSM_INT_VERDICT_BADSIG; 194 goto cleanup_sig; 195 } 196 > 197 if (validate_pkcs7_trust(msg, VERIFY_USE_SECONDARY_KEYRING)) { 198 err = LSM_INT_VERDICT_PARTIALSIG; 199 goto cleanup_msg; 200 } 201 if (pkcs7_get_authattr(msg, OID_hornet_data, 202 &authattrs, &authattrs_len) == -ENODATA) { 203 err = LSM_INT_VERDICT_PARTIALSIG; 204 goto cleanup_msg; 205 } 206 207 err = asn1_ber_decoder(&hornet_decoder, ctx, authattrs, authattrs_len); 208 if (err < 0 || authattrs == NULL) { 209 err = LSM_INT_VERDICT_PARTIALSIG; 210 goto cleanup_msg; 211 } 212 err = hornet_verify_hashes(&maps, ctx, prog); 213 214 cleanup_msg: 215 pkcs7_free_message(msg); 216 cleanup_sig: 217 kfree(sig); 218 out: 219 kfree(ctx); 220 return err; 221 } 222 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki