[PATCH v3] evm: Correct inode_init_security hooks behaviors
kernel test robot
lkp at intel.com
Wed Oct 26 01:51:33 UTC 2022
Hi Nicolas,
Thank you for the patch! Perhaps something to improve:
[auto build test WARNING on zohar-integrity/next-integrity]
[also build test WARNING on linus/master v6.1-rc2 next-20221025]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch#_base_tree_information]
url: https://github.com/intel-lab-lkp/linux/commits/Nicolas-Bouchinet/evm-Correct-inode_init_security-hooks-behaviors/20221025-221337
base: https://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git next-integrity
patch link: https://lore.kernel.org/r/Y1fu4jofqLHVDprT%40archlinux
patch subject: [PATCH v3] evm: Correct inode_init_security hooks behaviors
config: hexagon-randconfig-r002-20221023 (attached as .config)
compiler: clang version 16.0.0 (https://github.com/llvm/llvm-project 791a7ae1ba3efd6bca96338e10ffde557ba83920)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# https://github.com/intel-lab-lkp/linux/commit/acbbdcb851ed7cd1894efad182f0325db04b9e5a
git remote add linux-review https://github.com/intel-lab-lkp/linux
git fetch --no-tags linux-review Nicolas-Bouchinet/evm-Correct-inode_init_security-hooks-behaviors/20221025-221337
git checkout acbbdcb851ed7cd1894efad182f0325db04b9e5a
# save the config file
mkdir build_dir && cp config build_dir/.config
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross W=1 O=build_dir ARCH=hexagon SHELL=/bin/bash security/integrity/evm/
If you fix the issue, kindly add following tag where applicable
| Reported-by: kernel test robot <lkp at intel.com>
All warnings (new ones prefixed by >>):
>> security/integrity/evm/evm_main.c:310:5: warning: no previous prototype for function 'evm_protected_xattr' [-Wmissing-prototypes]
int evm_protected_xattr(const char *req_xattr_name)
^
security/integrity/evm/evm_main.c:310:1: note: declare 'static' if the function is not intended to be used outside of this translation unit
int evm_protected_xattr(const char *req_xattr_name)
^
static
1 warning generated.
vim +/evm_protected_xattr +310 security/integrity/evm/evm_main.c
309
> 310 int evm_protected_xattr(const char *req_xattr_name)
311 {
312 return evm_protected_xattr_common(req_xattr_name, false);
313 }
314
--
0-DAY CI Kernel Test Service
https://01.org/lkp
More information about the Linux-security-module-archive
mailing list