From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id E4657C27C4F for ; Thu, 13 Jun 2024 09:08:54 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 637FC6B00BA; Thu, 13 Jun 2024 05:08:54 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 5E7316B00BB; Thu, 13 Jun 2024 05:08:54 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 4AED36B00BC; Thu, 13 Jun 2024 05:08:54 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 2B2216B00BA for ; Thu, 13 Jun 2024 05:08:54 -0400 (EDT) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id C90831C2570 for ; Thu, 13 Jun 2024 09:08:53 +0000 (UTC) X-FDA: 82225290546.21.B24AE90 Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.17]) by imf16.hostedemail.com (Postfix) with ESMTP id 4DE3418000C for ; Thu, 13 Jun 2024 09:08:51 +0000 (UTC) Authentication-Results: imf16.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=hq0GMEd+; spf=pass (imf16.hostedemail.com: domain of lkp@intel.com designates 198.175.65.17 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1718269731; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=nQSoZguVDv0xA2NQRIhQa7djfi1362TN0Ye29dxfnRc=; b=40Na49rhp1ii2H39rFt8TmG6igrUTcd7kwN9Gvq27CqXVPlXH3+n5KDLi8+7sN4Yezypsj 2dPKz+k8vGAEuuibrH5S5GVuvLZOEnEuzHNVZ1BoKradx1VoURLwsBSqQ2mtGVXIU88nwr /pkAEKeffWqzQj4RLtY1EqaSXGNb5eQ= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1718269731; a=rsa-sha256; cv=none; b=V3lGkDxznCgfYRx/XfRFgdOTkYIwFN0byXmJCdQbYg/RBvnVrUmwTE+quMIoC8zyyPSB5o wVdH+19xnjOEcF0nx41nMTkEuxLxR4HgQnIRHJ2LB2Fdzob2cXqfI2AT6FAX5+KfAqvPZq rtCMpQHJ61j/yENItRxtgvjMwR3W9pA= ARC-Authentication-Results: i=1; imf16.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=hq0GMEd+; spf=pass (imf16.hostedemail.com: domain of lkp@intel.com designates 198.175.65.17 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1718269732; x=1749805732; h=date:from:to:cc:subject:message-id:mime-version; bh=zMyaHHimo6OvjtFb9RYOmPDvcnFDV8ay23PM9meInmI=; b=hq0GMEd+6r2Kj0NzPIzMima0XNTyLrcFwaaNpFgerptdiMYTzRUxmLR1 8hbIJWyQ2y3AvqF7zDKOmxJ+jqbTus6iw3+mwG7YpeOwktAxdtGOqEVCL f/VHvpkvSUYqE+zTPmtrq36SUF9SMDKt5Fj1nyIoIRBFaO+MuoDHtt+0U /pbOVLrs4P3M96MPHe6D/cvLG0V1Q7IssJLw5GEKSGMUPbQqnVmGV26xr 7Ke+QSGb0HwpIsME1ATyjeyDGehWf2eu0AUWTUwWsKqdWp+Qx9mngjhLj kheD00QeiCgy3XQbPTFf0PRrNlMtqpGYzlIKHyBOd8qfF+jFl4UEoLiXw w==; X-CSE-ConnectionGUID: SMApIHqgRmihbBhkBSPicw== X-CSE-MsgGUID: IccZnGkURemXJcQ1hMGhhw== X-IronPort-AV: E=McAfee;i="6700,10204,11101"; a="15201474" X-IronPort-AV: E=Sophos;i="6.08,234,1712646000"; d="scan'208";a="15201474" Received: from fmviesa001.fm.intel.com ([10.60.135.141]) by orvoesa109.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Jun 2024 02:08:50 -0700 X-CSE-ConnectionGUID: n2Zi160rSOaNNMr1MU1ucQ== X-CSE-MsgGUID: FCT4D8H7RrWMYujVDHlHGA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.08,234,1712646000"; d="scan'208";a="71282019" Received: from lkp-server01.sh.intel.com (HELO 628d7d8b9fc6) ([10.239.97.150]) by fmviesa001.fm.intel.com with ESMTP; 13 Jun 2024 02:08:47 -0700 Received: from kbuild by 628d7d8b9fc6 with local (Exim 4.96) (envelope-from ) id 1sHgRp-0002Qu-1P; Thu, 13 Jun 2024 09:08:45 +0000 Date: Thu, 13 Jun 2024 17:08:05 +0800 From: kernel test robot To: GUO Zihua Cc: llvm@lists.linux.dev, oe-kbuild-all@lists.linux.dev, Linux Memory Management List , Paul Moore , Mimi Zohar , Casey Schaufler Subject: [linux-next:master 5295/5501] security/integrity/ima/ima_policy.c:430:10: error: too many arguments to function call, expected 4, have 5 Message-ID: <202406131636.cCrcJztc-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspamd-Queue-Id: 4DE3418000C X-Stat-Signature: dfkng5bi8fso3rk7wgn8ucg8yoqhpwzg X-Rspamd-Server: rspam09 X-Rspam-User: X-HE-Tag: 1718269731-262377 X-HE-Meta: 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 3xlkIhek F408q+W2TEsWsGbifEOEl93fwToqQGxG+Vf6BCtpoH4+jmv5U4Nj/vjoX3L9iiwixWUnMQXUgsj3io7Ui08GvsbqbxlsSwBsQrNMUPx8DcHQ4QqSKgU6Y3ZjeMHV3Dqcp93jwa22+tNShtBZNBoxqDf3yU8nTQOoCsMkl3JB8GeYEEiWxeyje9j/xPELBLpVIYPwut3A1JNevobwsQb4poYspiwnfxNM1tYPHFyboO4QUjdRjVrEhzvo5ycaVl21slDoRvC9fi+Hg48Y3Vxv7oIlN1VqJXmBbJy5KKmEMjhs7MKSKPJSNpwbkCr/G+zcWqtgA0CltTqZ8FNadUTlQu3xcyqJd3hqD6MxAbyZDaLcd+ve0kYWahW27tkGNyX0r+fFQ X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master head: 6906a84c482f098d31486df8dc98cead21cce2d0 commit: 29f5bedff494c278af5f804ebfe0637c5f50f3bd [5295/5501] ima: Avoid blocking in RCU read-side critical section config: i386-buildonly-randconfig-004-20240613 (https://download.01.org/0day-ci/archive/20240613/202406131636.cCrcJztc-lkp@intel.com/config) compiler: clang version 18.1.5 (https://github.com/llvm/llvm-project 617a15a9eac96088ae5e9134248d8236e34b91b1) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240613/202406131636.cCrcJztc-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202406131636.cCrcJztc-lkp@intel.com/ All errors (new ones prefixed by >>): >> security/integrity/ima/ima_policy.c:430:10: error: too many arguments to function call, expected 4, have 5 427 | ima_filter_rule_init(nentry->lsm[i].type, Audit_equal, | ~~~~~~~~~~~~~~~~~~~~ 428 | nentry->lsm[i].args_p, 429 | &nentry->lsm[i].rule, 430 | gfp); | ^~~ security/integrity/ima/ima.h:548:19: note: 'ima_filter_rule_init' declared here 548 | static inline int ima_filter_rule_init(u32 field, u32 op, char *rulestr, | ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 549 | void **lsmrule) | ~~~~~~~~~~~~~~ security/integrity/ima/ima_policy.c:1146:11: error: too many arguments to function call, expected 4, have 5 1143 | result = ima_filter_rule_init(entry->lsm[lsm_rule].type, Audit_equal, | ~~~~~~~~~~~~~~~~~~~~ 1144 | entry->lsm[lsm_rule].args_p, 1145 | &entry->lsm[lsm_rule].rule, 1146 | GFP_KERNEL); | ^~~~~~~~~~ include/linux/gfp_types.h:374:20: note: expanded from macro 'GFP_KERNEL' 374 | #define GFP_KERNEL (__GFP_RECLAIM | __GFP_IO | __GFP_FS) | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ security/integrity/ima/ima.h:548:19: note: 'ima_filter_rule_init' declared here 548 | static inline int ima_filter_rule_init(u32 field, u32 op, char *rulestr, | ^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 549 | void **lsmrule) | ~~~~~~~~~~~~~~ 2 errors generated. vim +430 security/integrity/ima/ima_policy.c 403 404 static struct ima_rule_entry *ima_lsm_copy_rule(struct ima_rule_entry *entry, 405 gfp_t gfp) 406 { 407 struct ima_rule_entry *nentry; 408 int i; 409 410 /* 411 * Immutable elements are copied over as pointers and data; only 412 * lsm rules can change 413 */ 414 nentry = kmemdup(entry, sizeof(*nentry), gfp); 415 if (!nentry) 416 return NULL; 417 418 memset(nentry->lsm, 0, sizeof_field(struct ima_rule_entry, lsm)); 419 420 for (i = 0; i < MAX_LSM_RULES; i++) { 421 if (!entry->lsm[i].args_p) 422 continue; 423 424 nentry->lsm[i].type = entry->lsm[i].type; 425 nentry->lsm[i].args_p = entry->lsm[i].args_p; 426 427 ima_filter_rule_init(nentry->lsm[i].type, Audit_equal, 428 nentry->lsm[i].args_p, 429 &nentry->lsm[i].rule, > 430 gfp); 431 if (!nentry->lsm[i].rule) 432 pr_warn("rule for LSM \'%s\' is undefined\n", 433 nentry->lsm[i].args_p); 434 } 435 return nentry; 436 } 437 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki