From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 818BEC64EC4 for ; Wed, 8 Mar 2023 05:36:45 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 8B0A26B0072; Wed, 8 Mar 2023 00:36:44 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 8602D6B0073; Wed, 8 Mar 2023 00:36:44 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 727A3280001; Wed, 8 Mar 2023 00:36:44 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id 621A96B0072 for ; Wed, 8 Mar 2023 00:36:44 -0500 (EST) Received: from smtpin06.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id 00C76120339 for ; Wed, 8 Mar 2023 05:36:43 +0000 (UTC) X-FDA: 80544621528.06.B376403 Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by imf03.hostedemail.com (Postfix) with ESMTP id C664920014 for ; Wed, 8 Mar 2023 05:36:40 +0000 (UTC) Authentication-Results: imf03.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b="jZx/EmAy"; spf=pass (imf03.hostedemail.com: domain of lkp@intel.com designates 192.55.52.120 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1678253801; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=Q5I+LLMK5zEicgvM2Ydf1A6TvDWcoocC6R1PnkksdvI=; b=UPDseL/i7VO8cDzGk9D/PulKJiJZ7Rv2j7OZ8GEbcECWiWHv1Ekvgu/3ZDILRn/SR4MyAn 1KSLeZFYpB0uz7yz+a1ddh6ER/lG6xAtKdrRGi6/SxVOyyMoQ3t8BorN/3sROtT7aZusDp 3fGQFLB+hr9VjUSTkqO/kZo7VEIjGTA= ARC-Authentication-Results: i=1; imf03.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b="jZx/EmAy"; spf=pass (imf03.hostedemail.com: domain of lkp@intel.com designates 192.55.52.120 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1678253801; a=rsa-sha256; cv=none; b=So4cS8KPjcynH9BCcNRN+yoL9aNnPx3N4eZXwjb3bV016BFAUI3R5MukHRFIImFAoxaiQo F51G13xYjGR7TA+GYQM4tObyCAdhXnCkCrfJ5z1oM3yyDGqWgyU/dT2Gi/x0G54kI2+Mad ImeiARjnRoYtgxdbVecgmvV5RQ4WBrw= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1678253800; x=1709789800; h=date:from:to:cc:subject:message-id:mime-version; bh=/PU/5UgLhrOpJXpRDW5FLj7jSvg2KnF33Ge3DhHH6m8=; b=jZx/EmAyFrGlsX5Jo0k7CDOzNbaD/C1HW6WacvRhIJ6s2STsvJcyaIhX oxMRiEiVJFGvaQ13SU93JuYyQFoKGpk9o0WNaemQfIWHkMbm1oRRsHIMQ HHfUxNVr8HnAzW5cpuWiB2JTp9ZWuPTUmUjh9lZc8tTIhucnRjrzIgzeo XV+qSwM6ny9023Z4wrg6EL8ecS/WGSfBS4I6MIh4rkKzDTLML7gmT2CG0 CpJDRMpGhQ2uw54i1IpKjbKiItYCAZtn+h16qnuAc0FNjPyHd+ScM4lgO PrBHDobxlSCwE+YW6oIN+fKkmIZZ955xhcPU3Qt6cpuqsYcdCxH7LyYjU Q==; X-IronPort-AV: E=McAfee;i="6500,9779,10642"; a="334782029" X-IronPort-AV: E=Sophos;i="5.98,242,1673942400"; d="scan'208";a="334782029" Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 07 Mar 2023 21:36:38 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10642"; a="745777385" X-IronPort-AV: E=Sophos;i="5.98,242,1673942400"; d="scan'208";a="745777385" Received: from lkp-server01.sh.intel.com (HELO b613635ddfff) ([10.239.97.150]) by fmsmga004.fm.intel.com with ESMTP; 07 Mar 2023 21:36:37 -0800 Received: from kbuild by b613635ddfff with local (Exim 4.96) (envelope-from ) id 1pZmTc-0001uh-1P; Wed, 08 Mar 2023 05:36:36 +0000 Date: Wed, 8 Mar 2023 13:36:35 +0800 From: kernel test robot To: Paul Moore Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, Linux Memory Management List Subject: [linux-next:master 1234/1915] security/security.c:3647: warning: expecting prototype for security_socket_create(). Prototype was for security_socket_post_create() instead Message-ID: <202303081345.OAmwqAh7-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspamd-Queue-Id: C664920014 X-Stat-Signature: xpbpsar79gd9aoc3pcn1pqeunnz69ch7 X-Rspam-User: X-Rspamd-Server: rspam08 X-HE-Tag: 1678253800-519277 X-HE-Meta: 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 C6H6j1bo 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master head: fc31900c948610e7b5c2f15fb7795832c8325327 commit: 6b6bbe8c02a1bc7ef7f0aa490a3601a16cd145fe [1234/1915] lsm: move the socket hook comments to security/security.c config: x86_64-randconfig-a011-20230306 (https://download.01.org/0day-ci/archive/20230308/202303081345.OAmwqAh7-lkp@intel.com/config) compiler: clang version 14.0.6 (https://github.com/llvm/llvm-project f28c006a5895fc0e329fe15fead81e37457cb1d1) reproduce (this is a W=1 build): wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=6b6bbe8c02a1bc7ef7f0aa490a3601a16cd145fe git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git git fetch --no-tags linux-next master git checkout 6b6bbe8c02a1bc7ef7f0aa490a3601a16cd145fe # save the config file mkdir build_dir && cp config build_dir/.config COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=x86_64 olddefconfig COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash If you fix the issue, kindly add following tag where applicable | Reported-by: kernel test robot | Link: https://lore.kernel.org/oe-kbuild-all/202303081345.OAmwqAh7-lkp@intel.com/ All warnings (new ones prefixed by >>): security/security.c:1083: warning: Function parameter or member 'mnt_opts' not described in 'security_free_mnt_opts' security/security.c:1083: warning: Excess function parameter 'mnt_ops' description in 'security_free_mnt_opts' security/security.c:1101: warning: Function parameter or member 'mnt_opts' not described in 'security_sb_eat_lsm_opts' security/security.c:1101: warning: Excess function parameter 'mnt_ops' description in 'security_sb_eat_lsm_opts' security/security.c:1269: warning: Function parameter or member 'oldsb' not described in 'security_sb_clone_mnt_opts' security/security.c:1269: warning: Function parameter or member 'newsb' not described in 'security_sb_clone_mnt_opts' security/security.c:1269: warning: Excess function parameter 'olddb' description in 'security_sb_clone_mnt_opts' security/security.c:1269: warning: Excess function parameter 'newdb' description in 'security_sb_clone_mnt_opts' security/security.c:1760: warning: This comment starts with '/**', but isn't a kernel-doc comment. Refer Documentation/doc-guide/kernel-doc.rst * security_inode_symlink() Check if creating a symbolic link is allowed security/security.c:1976: warning: Function parameter or member 'size' not described in 'security_inode_setxattr' security/security.c:2533: warning: Function parameter or member 'prot' not described in 'security_file_mprotect' security/security.c:2533: warning: Excess function parameter 'prog' description in 'security_file_mprotect' >> security/security.c:3647: warning: expecting prototype for security_socket_create(). Prototype was for security_socket_post_create() instead security/security.c:3909: warning: Function parameter or member 'priority' not described in 'security_sk_alloc' security/security.c:3909: warning: Excess function parameter 'priotity' description in 'security_sk_alloc' security/security.c:3966: warning: Function parameter or member 'parent' not described in 'security_sock_graft' security/security.c:3966: warning: Excess function parameter 'sock' description in 'security_sock_graft' vim +3647 security/security.c 20510f2f4e2dabb James Morris 2007-10-16 3626 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3627 /** 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3628 * security_socket_create() - Initialize a newly created socket 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3629 * @sock: socket 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3630 * @family: protocol family 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3631 * @type: communications type 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3632 * @protocol: requested protocol 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3633 * @kern: set to 1 if a kernel socket is requested 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3634 * 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3635 * This hook allows a module to update or allocate a per-socket security 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3636 * structure. Note that the security field was not added directly to the socket 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3637 * structure, but rather, the socket security information is stored in the 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3638 * associated inode. Typically, the inode alloc_security hook will allocate 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3639 * and attach security information to SOCK_INODE(sock)->i_security. This hook 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3640 * may be used to update the SOCK_INODE(sock)->i_security field with additional 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3641 * information that wasn't available when the inode was allocated. 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3642 * 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3643 * Return: Returns 0 if permission is granted. 6b6bbe8c02a1bc7 Paul Moore 2023-02-12 3644 */ 20510f2f4e2dabb James Morris 2007-10-16 3645 int security_socket_post_create(struct socket *sock, int family, 20510f2f4e2dabb James Morris 2007-10-16 3646 int type, int protocol, int kern) 20510f2f4e2dabb James Morris 2007-10-16 @3647 { f25fce3e8f1f15d Casey Schaufler 2015-05-02 3648 return call_int_hook(socket_post_create, 0, sock, family, type, 20510f2f4e2dabb James Morris 2007-10-16 3649 protocol, kern); 20510f2f4e2dabb James Morris 2007-10-16 3650 } 20510f2f4e2dabb James Morris 2007-10-16 3651 :::::: The code at line 3647 was first introduced by commit :::::: 20510f2f4e2dabb0ff6c13901807627ec9452f98 security: Convert LSM into a static interface :::::: TO: James Morris :::::: CC: Linus Torvalds -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests