lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202007261735.woRurWHH%lkp@intel.com>
Date:   Sun, 26 Jul 2020 17:40:39 +0800
From:   kernel test robot <lkp@...el.com>
To:     Thomas Gleixner <tglx@...utronix.de>
Cc:     kbuild-all@...ts.01.org, clang-built-linux@...glegroups.com,
        linux-kernel@...r.kernel.org, x86@...nel.org,
        Kees Cook <keescook@...omium.org>
Subject: [tip:x86/entry 10/15] kernel/entry/common.c:58:28: error: too many
 arguments to function call, expected 0, have 1

Hi Thomas,

First bad commit (maybe != root cause):

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git x86/entry
head:   72c3c0fe54a3f3ddea8f5ca468ddf9deaf2100b7
commit: 27d6b4d14f5c3ab21c4aef87dd04055a2d7adf14 [10/15] x86/entry: Use generic syscall entry function
config: x86_64-randconfig-a005-20200726 (attached as .config)
compiler: clang version 12.0.0 (https://github.com/llvm/llvm-project 8bf4c1f4fb257774f66c8cda07adc6c5e8668326)
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # install x86_64 cross compiling tool for clang build
        # apt-get install binutils-x86-64-linux-gnu
        git checkout 27d6b4d14f5c3ab21c4aef87dd04055a2d7adf14
        # save the attached .config to linux build tree
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=x86_64 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@...el.com>

All errors (new ones prefixed by >>):

>> kernel/entry/common.c:58:28: error: too many arguments to function call, expected 0, have 1
                   ret = __secure_computing(NULL);
                         ~~~~~~~~~~~~~~~~~~ ^~~~
   include/linux/stddef.h:8:14: note: expanded from macro 'NULL'
   #define NULL ((void *)0)
                ^~~~~~~~~~~
   include/linux/seccomp.h:64:19: note: '__secure_computing' declared here
   static inline int __secure_computing(void) { return 0; }
                     ^
   1 error generated.

vim +58 kernel/entry/common.c

142781e108b13b Thomas Gleixner 2020-07-22  43  
142781e108b13b Thomas Gleixner 2020-07-22  44  static long syscall_trace_enter(struct pt_regs *regs, long syscall,
142781e108b13b Thomas Gleixner 2020-07-22  45  				unsigned long ti_work)
142781e108b13b Thomas Gleixner 2020-07-22  46  {
142781e108b13b Thomas Gleixner 2020-07-22  47  	long ret = 0;
142781e108b13b Thomas Gleixner 2020-07-22  48  
142781e108b13b Thomas Gleixner 2020-07-22  49  	/* Handle ptrace */
142781e108b13b Thomas Gleixner 2020-07-22  50  	if (ti_work & (_TIF_SYSCALL_TRACE | _TIF_SYSCALL_EMU)) {
142781e108b13b Thomas Gleixner 2020-07-22  51  		ret = arch_syscall_enter_tracehook(regs);
142781e108b13b Thomas Gleixner 2020-07-22  52  		if (ret || (ti_work & _TIF_SYSCALL_EMU))
142781e108b13b Thomas Gleixner 2020-07-22  53  			return -1L;
142781e108b13b Thomas Gleixner 2020-07-22  54  	}
142781e108b13b Thomas Gleixner 2020-07-22  55  
142781e108b13b Thomas Gleixner 2020-07-22  56  	/* Do seccomp after ptrace, to catch any tracer changes. */
142781e108b13b Thomas Gleixner 2020-07-22  57  	if (ti_work & _TIF_SECCOMP) {
142781e108b13b Thomas Gleixner 2020-07-22 @58  		ret = __secure_computing(NULL);
142781e108b13b Thomas Gleixner 2020-07-22  59  		if (ret == -1L)
142781e108b13b Thomas Gleixner 2020-07-22  60  			return ret;
142781e108b13b Thomas Gleixner 2020-07-22  61  	}
142781e108b13b Thomas Gleixner 2020-07-22  62  
142781e108b13b Thomas Gleixner 2020-07-22  63  	if (unlikely(ti_work & _TIF_SYSCALL_TRACEPOINT))
142781e108b13b Thomas Gleixner 2020-07-22  64  		trace_sys_enter(regs, syscall);
142781e108b13b Thomas Gleixner 2020-07-22  65  
142781e108b13b Thomas Gleixner 2020-07-22  66  	syscall_enter_audit(regs, syscall);
142781e108b13b Thomas Gleixner 2020-07-22  67  
142781e108b13b Thomas Gleixner 2020-07-22  68  	return ret ? : syscall;
142781e108b13b Thomas Gleixner 2020-07-22  69  }
142781e108b13b Thomas Gleixner 2020-07-22  70  

:::::: The code at line 58 was first introduced by commit
:::::: 142781e108b13b2b0e8f035cfb5bfbbc8f14d887 entry: Provide generic syscall entry functionality

:::::: TO: Thomas Gleixner <tglx@...utronix.de>
:::::: CC: Thomas Gleixner <tglx@...utronix.de>

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

Download attachment ".config.gz" of type "application/gzip" (31929 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ