From: kernel test robot <lkp@intel.com>
To: Paul Moore <paul@paul-moore.com>
Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev,
Linux Memory Management List <linux-mm@kvack.org>
Subject: [linux-next:master 1239/1915] security/security.c:3566: warning: expecting prototype for security_sem_ctl(). Prototype was for security_sem_semctl() instead
Date: Thu, 9 Mar 2023 01:34:56 +0800 [thread overview]
Message-ID: <202303090143.xmmvxZYq-lkp@intel.com> (raw)
tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
head: fc31900c948610e7b5c2f15fb7795832c8325327
commit: 43fad282187695e25c51425ee9f5f9f08fe5e15d [1239/1915] lsm: move the sysv hook comments to security/security.c
config: x86_64-randconfig-a011-20230306 (https://download.01.org/0day-ci/archive/20230309/202303090143.xmmvxZYq-lkp@intel.com/config)
compiler: clang version 14.0.6 (https://github.com/llvm/llvm-project f28c006a5895fc0e329fe15fead81e37457cb1d1)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=43fad282187695e25c51425ee9f5f9f08fe5e15d
git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
git fetch --no-tags linux-next master
git checkout 43fad282187695e25c51425ee9f5f9f08fe5e15d
# save the config file
mkdir build_dir && cp config build_dir/.config
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=x86_64 olddefconfig
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash
If you fix the issue, kindly add following tag where applicable
| Reported-by: kernel test robot <lkp@intel.com>
| Link: https://lore.kernel.org/oe-kbuild-all/202303090143.xmmvxZYq-lkp@intel.com/
All warnings (new ones prefixed by >>):
security/security.c:1083: warning: Function parameter or member 'mnt_opts' not described in 'security_free_mnt_opts'
security/security.c:1083: warning: Excess function parameter 'mnt_ops' description in 'security_free_mnt_opts'
security/security.c:1101: warning: Function parameter or member 'mnt_opts' not described in 'security_sb_eat_lsm_opts'
security/security.c:1101: warning: Excess function parameter 'mnt_ops' description in 'security_sb_eat_lsm_opts'
security/security.c:1269: warning: Function parameter or member 'oldsb' not described in 'security_sb_clone_mnt_opts'
security/security.c:1269: warning: Function parameter or member 'newsb' not described in 'security_sb_clone_mnt_opts'
security/security.c:1269: warning: Excess function parameter 'olddb' description in 'security_sb_clone_mnt_opts'
security/security.c:1269: warning: Excess function parameter 'newdb' description in 'security_sb_clone_mnt_opts'
security/security.c:1760: warning: This comment starts with '/**', but isn't a kernel-doc comment. Refer Documentation/doc-guide/kernel-doc.rst
* security_inode_symlink() Check if creating a symbolic link is allowed
security/security.c:1976: warning: Function parameter or member 'size' not described in 'security_inode_setxattr'
security/security.c:2533: warning: Function parameter or member 'prot' not described in 'security_file_mprotect'
security/security.c:2533: warning: Excess function parameter 'prog' description in 'security_file_mprotect'
security/security.c:3267: warning: Function parameter or member 'flag' not described in 'security_ipc_permission'
security/security.c:3267: warning: Excess function parameter 'flags' description in 'security_ipc_permission'
>> security/security.c:3566: warning: expecting prototype for security_sem_ctl(). Prototype was for security_sem_semctl() instead
security/security.c:3838: warning: expecting prototype for security_socket_create(). Prototype was for security_socket_post_create() instead
security/security.c:4100: warning: Function parameter or member 'priority' not described in 'security_sk_alloc'
security/security.c:4100: warning: Excess function parameter 'priotity' description in 'security_sk_alloc'
security/security.c:4157: warning: Function parameter or member 'parent' not described in 'security_sock_graft'
security/security.c:4157: warning: Excess function parameter 'sock' description in 'security_sock_graft'
security/security.c:4614: warning: Function parameter or member 'xp' not described in 'security_xfrm_state_pol_flow_match'
security/security.c:4720: warning: Function parameter or member '_buffer' not described in 'security_key_getsecurity'
security/security.c:4720: warning: Excess function parameter 'buffer' description in 'security_key_getsecurity'
vim +3566 security/security.c
20510f2f4e2dab James Morris 2007-10-16 3554
43fad282187695 Paul Moore 2023-02-16 3555 /**
43fad282187695 Paul Moore 2023-02-16 3556 * security_sem_ctl() - Check if a sysv semaphore operation is allowed
43fad282187695 Paul Moore 2023-02-16 3557 * @sma: sysv ipc permission structure
43fad282187695 Paul Moore 2023-02-16 3558 * @cmd: operation
43fad282187695 Paul Moore 2023-02-16 3559 *
43fad282187695 Paul Moore 2023-02-16 3560 * Check permission when a semaphore operation specified by @cmd is to be
43fad282187695 Paul Moore 2023-02-16 3561 * performed on the semaphore.
43fad282187695 Paul Moore 2023-02-16 3562 *
43fad282187695 Paul Moore 2023-02-16 3563 * Return: Returns 0 if permission is granted.
43fad282187695 Paul Moore 2023-02-16 3564 */
aefad9593ec5ad Eric W. Biederman 2018-03-22 3565 int security_sem_semctl(struct kern_ipc_perm *sma, int cmd)
20510f2f4e2dab James Morris 2007-10-16 @3566 {
f25fce3e8f1f15 Casey Schaufler 2015-05-02 3567 return call_int_hook(sem_semctl, 0, sma, cmd);
20510f2f4e2dab James Morris 2007-10-16 3568 }
20510f2f4e2dab James Morris 2007-10-16 3569
:::::: The code at line 3566 was first introduced by commit
:::::: 20510f2f4e2dabb0ff6c13901807627ec9452f98 security: Convert LSM into a static interface
:::::: TO: James Morris <jmorris@namei.org>
:::::: CC: Linus Torvalds <torvalds@woody.linux-foundation.org>
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests
reply other threads:[~2023-03-08 17:36 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=202303090143.xmmvxZYq-lkp@intel.com \
--to=lkp@intel.com \
--cc=linux-mm@kvack.org \
--cc=llvm@lists.linux.dev \
--cc=oe-kbuild-all@lists.linux.dev \
--cc=paul@paul-moore.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox