linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
* [linux-next:master 1239/1915] security/security.c:3566: warning: expecting prototype for security_sem_ctl(). Prototype was for security_sem_semctl() instead
@ 2023-03-08 17:34 kernel test robot
  0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2023-03-08 17:34 UTC (permalink / raw)
  To: Paul Moore; +Cc: llvm, oe-kbuild-all, Linux Memory Management List

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master
head:   fc31900c948610e7b5c2f15fb7795832c8325327
commit: 43fad282187695e25c51425ee9f5f9f08fe5e15d [1239/1915] lsm: move the sysv hook comments to security/security.c
config: x86_64-randconfig-a011-20230306 (https://download.01.org/0day-ci/archive/20230309/202303090143.xmmvxZYq-lkp@intel.com/config)
compiler: clang version 14.0.6 (https://github.com/llvm/llvm-project f28c006a5895fc0e329fe15fead81e37457cb1d1)
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=43fad282187695e25c51425ee9f5f9f08fe5e15d
        git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
        git fetch --no-tags linux-next master
        git checkout 43fad282187695e25c51425ee9f5f9f08fe5e15d
        # save the config file
        mkdir build_dir && cp config build_dir/.config
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=x86_64 olddefconfig
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash

If you fix the issue, kindly add following tag where applicable
| Reported-by: kernel test robot <lkp@intel.com>
| Link: https://lore.kernel.org/oe-kbuild-all/202303090143.xmmvxZYq-lkp@intel.com/

All warnings (new ones prefixed by >>):

   security/security.c:1083: warning: Function parameter or member 'mnt_opts' not described in 'security_free_mnt_opts'
   security/security.c:1083: warning: Excess function parameter 'mnt_ops' description in 'security_free_mnt_opts'
   security/security.c:1101: warning: Function parameter or member 'mnt_opts' not described in 'security_sb_eat_lsm_opts'
   security/security.c:1101: warning: Excess function parameter 'mnt_ops' description in 'security_sb_eat_lsm_opts'
   security/security.c:1269: warning: Function parameter or member 'oldsb' not described in 'security_sb_clone_mnt_opts'
   security/security.c:1269: warning: Function parameter or member 'newsb' not described in 'security_sb_clone_mnt_opts'
   security/security.c:1269: warning: Excess function parameter 'olddb' description in 'security_sb_clone_mnt_opts'
   security/security.c:1269: warning: Excess function parameter 'newdb' description in 'security_sb_clone_mnt_opts'
   security/security.c:1760: warning: This comment starts with '/**', but isn't a kernel-doc comment. Refer Documentation/doc-guide/kernel-doc.rst
    * security_inode_symlink() Check if creating a symbolic link is allowed
   security/security.c:1976: warning: Function parameter or member 'size' not described in 'security_inode_setxattr'
   security/security.c:2533: warning: Function parameter or member 'prot' not described in 'security_file_mprotect'
   security/security.c:2533: warning: Excess function parameter 'prog' description in 'security_file_mprotect'
   security/security.c:3267: warning: Function parameter or member 'flag' not described in 'security_ipc_permission'
   security/security.c:3267: warning: Excess function parameter 'flags' description in 'security_ipc_permission'
>> security/security.c:3566: warning: expecting prototype for security_sem_ctl(). Prototype was for security_sem_semctl() instead
   security/security.c:3838: warning: expecting prototype for security_socket_create(). Prototype was for security_socket_post_create() instead
   security/security.c:4100: warning: Function parameter or member 'priority' not described in 'security_sk_alloc'
   security/security.c:4100: warning: Excess function parameter 'priotity' description in 'security_sk_alloc'
   security/security.c:4157: warning: Function parameter or member 'parent' not described in 'security_sock_graft'
   security/security.c:4157: warning: Excess function parameter 'sock' description in 'security_sock_graft'
   security/security.c:4614: warning: Function parameter or member 'xp' not described in 'security_xfrm_state_pol_flow_match'
   security/security.c:4720: warning: Function parameter or member '_buffer' not described in 'security_key_getsecurity'
   security/security.c:4720: warning: Excess function parameter 'buffer' description in 'security_key_getsecurity'


vim +3566 security/security.c

20510f2f4e2dab James Morris      2007-10-16  3554  
43fad282187695 Paul Moore        2023-02-16  3555  /**
43fad282187695 Paul Moore        2023-02-16  3556   * security_sem_ctl() - Check if a sysv semaphore operation is allowed
43fad282187695 Paul Moore        2023-02-16  3557   * @sma: sysv ipc permission structure
43fad282187695 Paul Moore        2023-02-16  3558   * @cmd: operation
43fad282187695 Paul Moore        2023-02-16  3559   *
43fad282187695 Paul Moore        2023-02-16  3560   * Check permission when a semaphore operation specified by @cmd is to be
43fad282187695 Paul Moore        2023-02-16  3561   * performed on the semaphore.
43fad282187695 Paul Moore        2023-02-16  3562   *
43fad282187695 Paul Moore        2023-02-16  3563   * Return: Returns 0 if permission is granted.
43fad282187695 Paul Moore        2023-02-16  3564   */
aefad9593ec5ad Eric W. Biederman 2018-03-22  3565  int security_sem_semctl(struct kern_ipc_perm *sma, int cmd)
20510f2f4e2dab James Morris      2007-10-16 @3566  {
f25fce3e8f1f15 Casey Schaufler   2015-05-02  3567  	return call_int_hook(sem_semctl, 0, sma, cmd);
20510f2f4e2dab James Morris      2007-10-16  3568  }
20510f2f4e2dab James Morris      2007-10-16  3569  

:::::: The code at line 3566 was first introduced by commit
:::::: 20510f2f4e2dabb0ff6c13901807627ec9452f98 security: Convert LSM into a static interface

:::::: TO: James Morris <jmorris@namei.org>
:::::: CC: Linus Torvalds <torvalds@woody.linux-foundation.org>

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests


^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2023-03-08 17:36 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-03-08 17:34 [linux-next:master 1239/1915] security/security.c:3566: warning: expecting prototype for security_sem_ctl(). Prototype was for security_sem_semctl() instead kernel test robot

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox