From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 71407C678D5 for ; Wed, 8 Mar 2023 17:36:02 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id D270C280001; Wed, 8 Mar 2023 12:36:01 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id CD4EF6B0074; Wed, 8 Mar 2023 12:36:01 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B9F46280001; Wed, 8 Mar 2023 12:36:01 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id ABADC6B0072 for ; Wed, 8 Mar 2023 12:36:01 -0500 (EST) Received: from smtpin18.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 50A8DAB65B for ; Wed, 8 Mar 2023 17:36:01 +0000 (UTC) X-FDA: 80546434122.18.51A3942 Received: from mga06.intel.com (mga06b.intel.com [134.134.136.31]) by imf16.hostedemail.com (Postfix) with ESMTP id 0CD9F18001C for ; Wed, 8 Mar 2023 17:35:57 +0000 (UTC) Authentication-Results: imf16.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=YV6Gs6hA; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf16.hostedemail.com: domain of lkp@intel.com designates 134.134.136.31 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1678296958; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=DqVjb6XIxCI2d6kvgRUGwwfPZz5g46AlEnsJ7cKMfnI=; b=A9+u1v4I5zmL0iPF5hf1jY8hf9qK4t0UpHcLQ2jps5O2Z+FNBqHS2yF8pdWVHUJ76wfrdD /oa7ETkOfM3KK55hABEg3i5gqPWP6maeX4p0csGpoYcxqKgFafGK+jLdK9aw2fBlrEsFs2 6FO+abnKqkJbkUi19Uo0aaw8+o8GkOg= ARC-Authentication-Results: i=1; imf16.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=YV6Gs6hA; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf16.hostedemail.com: domain of lkp@intel.com designates 134.134.136.31 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1678296958; a=rsa-sha256; cv=none; b=WdvBGFebHHCr2wvLUpuqlsPrcKIUXkxoWfZY608cDosCs+ZmhNeWMmCbR0YTKmtb/0bgO7 xwJ//BrI1CUNIKrj7IWt16grX4I8BXCNwdeni7pgmsU0fFt62ay8HM87GLqUDwnelfs4Wp LH9b1Let+TP2sYQX1UKwvjfCTI5pj0s= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1678296958; x=1709832958; h=date:from:to:cc:subject:message-id:mime-version; bh=VOMowpisuT+Vu8Qd1JnOmOwSzbYzkLa2oKEzLeAm7eM=; b=YV6Gs6hAGt50ZuG6f+uhanKqYueQcJ+lefb4oyNnp07lmNhDAxfH1S7h Qr2m+3eZ1zDjACZAd7tLokvAeqtJR4M2Z3SZZWF2oWbOU2TXOYtyWNLYY qiclsuWxXE0Zy3/jJEkUY+AYgE6FnUKllqBcdsjRxLZrQ/p7++r4SyKPS Z/xO7KMONlBG17gjQJCf3OqMa2/ilFtdpRoQ3oE3ZvvoiNUfJ5dZIGWVD A1I/WieMXUz11rMdpyeO9e3JovsNyKLnY+Miq1/We+IvC938NTTJAs7zh THmvBhPusAYOjNvIa2kJ4FJILFr8utr0HiswcFA4zj3lh/Gn1XSajHXbK g==; X-IronPort-AV: E=McAfee;i="6500,9779,10643"; a="398802385" X-IronPort-AV: E=Sophos;i="5.98,244,1673942400"; d="scan'208";a="398802385" Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Mar 2023 09:35:56 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10643"; a="820315270" X-IronPort-AV: E=Sophos;i="5.98,244,1673942400"; d="scan'208";a="820315270" Received: from lkp-server01.sh.intel.com (HELO b613635ddfff) ([10.239.97.150]) by fmsmga001.fm.intel.com with ESMTP; 08 Mar 2023 09:35:54 -0800 Received: from kbuild by b613635ddfff with local (Exim 4.96) (envelope-from ) id 1pZxhh-0002Iz-2K; Wed, 08 Mar 2023 17:35:53 +0000 Date: Thu, 9 Mar 2023 01:34:56 +0800 From: kernel test robot To: Paul Moore Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, Linux Memory Management List Subject: [linux-next:master 1239/1915] security/security.c:3566: warning: expecting prototype for security_sem_ctl(). Prototype was for security_sem_semctl() instead Message-ID: <202303090143.xmmvxZYq-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspam-User: X-Rspamd-Server: rspam02 X-Rspamd-Queue-Id: 0CD9F18001C X-Stat-Signature: yp7p5njp1y9t4rcbgo151a9ywm1ny1da X-HE-Tag: 1678296957-695159 X-HE-Meta: U2FsdGVkX18z/XSgdz0ZfspWrxC15l4mgpMwi4Z25PSD4lZ3qpq6Nr88jT6tDBVXQ/p1Gy9QDQMpTP3nFF3vW9a/uVs7zD2WEU7b5WHp9coxElRFIzoMUOyVPGit4CT8iOgTmff+y05mu04Mi4ZDOiHsFrVS+oCITglRXkpPAd4J7EMSl46+Kt6oVtfjRBPm8DPJ3iDJ6CX1FfS6XG6IcaYMS39GixXrGMRhFStaD55Zt+QcqLp8zu1J/FH1an+X1a2hb6FOLmQlCm2EL8aRHPa2TZX7ieiRrJGjw6DoSusp2wFlyjw0x0OELBxYEiVcAnIxzT/Gzc7eROYqabiOTaEYMOLadNPmQJYRbJXpTpvk2axB4B1x8ABHXlIe0nJpphjh/h/1iv7PDALH7pX02HY9zVyx+I3PQ/pyM2YQxAe5bTqa0phkueRPvUU8WuDYfgsWTmz9S3VKEJJ0yFsj5Xf2QYBkFkqr5j1n7jawcqOzM9eZyIxpYyU+0SLl5uvCHAFg4WvusTshoSjRYN0tDBox6gkk4oSEeaajcVr9Q1dq6SaXkwT4dpEMCovKQfNj62+VK6VXFabNU5JjVzP69PgfZlgLvuSsm942WYZFXENqtVtRF1gKN9ZWpf0WNbiBWpOCyGSm8Re0nkaZcHjp50UyhkQxBYVqOgLv2c3R8l34QUzH69sodeza1tIr0e+J4tia250wWlQ+vebC2udTXYiLVJLbqgBTNY6fBLbo7J4ctyUe3KNThSSoTpQ5PpiD2pAIGukTWKdq8KtnqUaJrcCc/TXlEU8TAcmTfO5b6tPdYW3TI7XipE1lLLZYy+iBk2T7VwQaWynAe0ZceWKHb/zQC+y40QfQxcfri0w8f7ynig8kHEGcicfpl24kCQrtFMxPseB2UorJu6cIr2EMKmuqKkxN8ZgQMIita2NPUEW6Av5lWsIoOFnqQe87nWSNrLqcXdHrZDTInDiaMC7 f3V8LLcA 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master head: fc31900c948610e7b5c2f15fb7795832c8325327 commit: 43fad282187695e25c51425ee9f5f9f08fe5e15d [1239/1915] lsm: move the sysv hook comments to security/security.c config: x86_64-randconfig-a011-20230306 (https://download.01.org/0day-ci/archive/20230309/202303090143.xmmvxZYq-lkp@intel.com/config) compiler: clang version 14.0.6 (https://github.com/llvm/llvm-project f28c006a5895fc0e329fe15fead81e37457cb1d1) reproduce (this is a W=1 build): wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=43fad282187695e25c51425ee9f5f9f08fe5e15d git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git git fetch --no-tags linux-next master git checkout 43fad282187695e25c51425ee9f5f9f08fe5e15d # save the config file mkdir build_dir && cp config build_dir/.config COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=x86_64 olddefconfig COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=x86_64 SHELL=/bin/bash If you fix the issue, kindly add following tag where applicable | Reported-by: kernel test robot | Link: https://lore.kernel.org/oe-kbuild-all/202303090143.xmmvxZYq-lkp@intel.com/ All warnings (new ones prefixed by >>): security/security.c:1083: warning: Function parameter or member 'mnt_opts' not described in 'security_free_mnt_opts' security/security.c:1083: warning: Excess function parameter 'mnt_ops' description in 'security_free_mnt_opts' security/security.c:1101: warning: Function parameter or member 'mnt_opts' not described in 'security_sb_eat_lsm_opts' security/security.c:1101: warning: Excess function parameter 'mnt_ops' description in 'security_sb_eat_lsm_opts' security/security.c:1269: warning: Function parameter or member 'oldsb' not described in 'security_sb_clone_mnt_opts' security/security.c:1269: warning: Function parameter or member 'newsb' not described in 'security_sb_clone_mnt_opts' security/security.c:1269: warning: Excess function parameter 'olddb' description in 'security_sb_clone_mnt_opts' security/security.c:1269: warning: Excess function parameter 'newdb' description in 'security_sb_clone_mnt_opts' security/security.c:1760: warning: This comment starts with '/**', but isn't a kernel-doc comment. Refer Documentation/doc-guide/kernel-doc.rst * security_inode_symlink() Check if creating a symbolic link is allowed security/security.c:1976: warning: Function parameter or member 'size' not described in 'security_inode_setxattr' security/security.c:2533: warning: Function parameter or member 'prot' not described in 'security_file_mprotect' security/security.c:2533: warning: Excess function parameter 'prog' description in 'security_file_mprotect' security/security.c:3267: warning: Function parameter or member 'flag' not described in 'security_ipc_permission' security/security.c:3267: warning: Excess function parameter 'flags' description in 'security_ipc_permission' >> security/security.c:3566: warning: expecting prototype for security_sem_ctl(). Prototype was for security_sem_semctl() instead security/security.c:3838: warning: expecting prototype for security_socket_create(). Prototype was for security_socket_post_create() instead security/security.c:4100: warning: Function parameter or member 'priority' not described in 'security_sk_alloc' security/security.c:4100: warning: Excess function parameter 'priotity' description in 'security_sk_alloc' security/security.c:4157: warning: Function parameter or member 'parent' not described in 'security_sock_graft' security/security.c:4157: warning: Excess function parameter 'sock' description in 'security_sock_graft' security/security.c:4614: warning: Function parameter or member 'xp' not described in 'security_xfrm_state_pol_flow_match' security/security.c:4720: warning: Function parameter or member '_buffer' not described in 'security_key_getsecurity' security/security.c:4720: warning: Excess function parameter 'buffer' description in 'security_key_getsecurity' vim +3566 security/security.c 20510f2f4e2dab James Morris 2007-10-16 3554 43fad282187695 Paul Moore 2023-02-16 3555 /** 43fad282187695 Paul Moore 2023-02-16 3556 * security_sem_ctl() - Check if a sysv semaphore operation is allowed 43fad282187695 Paul Moore 2023-02-16 3557 * @sma: sysv ipc permission structure 43fad282187695 Paul Moore 2023-02-16 3558 * @cmd: operation 43fad282187695 Paul Moore 2023-02-16 3559 * 43fad282187695 Paul Moore 2023-02-16 3560 * Check permission when a semaphore operation specified by @cmd is to be 43fad282187695 Paul Moore 2023-02-16 3561 * performed on the semaphore. 43fad282187695 Paul Moore 2023-02-16 3562 * 43fad282187695 Paul Moore 2023-02-16 3563 * Return: Returns 0 if permission is granted. 43fad282187695 Paul Moore 2023-02-16 3564 */ aefad9593ec5ad Eric W. Biederman 2018-03-22 3565 int security_sem_semctl(struct kern_ipc_perm *sma, int cmd) 20510f2f4e2dab James Morris 2007-10-16 @3566 { f25fce3e8f1f15 Casey Schaufler 2015-05-02 3567 return call_int_hook(sem_semctl, 0, sma, cmd); 20510f2f4e2dab James Morris 2007-10-16 3568 } 20510f2f4e2dab James Morris 2007-10-16 3569 :::::: The code at line 3566 was first introduced by commit :::::: 20510f2f4e2dabb0ff6c13901807627ec9452f98 security: Convert LSM into a static interface :::::: TO: James Morris :::::: CC: Linus Torvalds -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests