lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202007270837.7fzDKYXF%lkp@intel.com>
Date:   Mon, 27 Jul 2020 08:13:42 +0800
From:   kernel test robot <lkp@...el.com>
To:     Ingo Molnar <mingo@...nel.org>
Cc:     kbuild-all@...ts.01.org, linux-kernel@...r.kernel.org,
        x86@...nel.org
Subject: [tip:WIP.core/entry 1/1] arch/arm64/kernel/ptrace.c:1863:6: error:
 too few arguments to function 'secure_computing'

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git WIP.core/entry
head:   85546baab915492f05f29b91c4003bf15891e89b
commit: 85546baab915492f05f29b91c4003bf15891e89b [1/1] entry: Fix !CONFIG_SECCOMP stub
config: arm64-allnoconfig (attached as .config)
compiler: aarch64-linux-gcc (GCC) 9.3.0
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        git checkout 85546baab915492f05f29b91c4003bf15891e89b
        # save the attached .config to linux build tree
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-9.3.0 make.cross ARCH=arm64 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@...el.com>

All errors (new ones prefixed by >>):

   arch/arm64/kernel/ptrace.c:1852:5: warning: no previous prototype for 'syscall_trace_enter' [-Wmissing-prototypes]
    1852 | int syscall_trace_enter(struct pt_regs *regs)
         |     ^~~~~~~~~~~~~~~~~~~
   arch/arm64/kernel/ptrace.c: In function 'syscall_trace_enter':
>> arch/arm64/kernel/ptrace.c:1863:6: error: too few arguments to function 'secure_computing'
    1863 |  if (secure_computing() == -1)
         |      ^~~~~~~~~~~~~~~~
   In file included from include/linux/sched.h:21,
                    from include/linux/audit.h:12,
                    from arch/arm64/kernel/ptrace.c:11:
   include/linux/seccomp.h:64:19: note: declared here
      64 | static inline int secure_computing(const struct seccomp_data *sd) { return 0; }
         |                   ^~~~~~~~~~~~~~~~
   arch/arm64/kernel/ptrace.c: At top level:
   arch/arm64/kernel/ptrace.c:1875:6: warning: no previous prototype for 'syscall_trace_exit' [-Wmissing-prototypes]
    1875 | void syscall_trace_exit(struct pt_regs *regs)
         |      ^~~~~~~~~~~~~~~~~~

vim +/secure_computing +1863 arch/arm64/kernel/ptrace.c

3157858feff891 AKASHI Takahiro   2014-04-30  1851  
11527b3e0b5775 Will Deacon       2018-07-12  1852  int syscall_trace_enter(struct pt_regs *regs)
3157858feff891 AKASHI Takahiro   2014-04-30  1853  {
1cf6022bd91610 Keno Fischer      2020-05-15  1854  	unsigned long flags = READ_ONCE(current_thread_info()->flags);
1cf6022bd91610 Keno Fischer      2020-05-15  1855  
1cf6022bd91610 Keno Fischer      2020-05-15  1856  	if (flags & (_TIF_SYSCALL_EMU | _TIF_SYSCALL_TRACE)) {
3157858feff891 AKASHI Takahiro   2014-04-30  1857  		tracehook_report_syscall(regs, PTRACE_SYSCALL_ENTER);
1cf6022bd91610 Keno Fischer      2020-05-15  1858  		if (!in_syscall(regs) || (flags & _TIF_SYSCALL_EMU))
d83ee6e3e75db6 Will Deacon       2020-07-10  1859  			return NO_SYSCALL;
f086f67485c5c1 Sudeep Holla      2019-05-23  1860  	}
478fcb2cdb2351 Will Deacon       2012-03-05  1861  
a5cd110cb8369d Kees Cook         2016-06-02  1862  	/* Do the secure computing after ptrace; failures should be fast. */
fefad9ef58ffc2 Christian Brauner 2019-09-24 @1863  	if (secure_computing() == -1)
d83ee6e3e75db6 Will Deacon       2020-07-10  1864  		return NO_SYSCALL;
a5cd110cb8369d Kees Cook         2016-06-02  1865  
055b1212d141f1 AKASHI Takahiro   2014-04-30  1866  	if (test_thread_flag(TIF_SYSCALL_TRACEPOINT))
055b1212d141f1 AKASHI Takahiro   2014-04-30  1867  		trace_sys_enter(regs, regs->syscallno);
055b1212d141f1 AKASHI Takahiro   2014-04-30  1868  
4913c59890b077 Eric Paris        2014-09-23  1869  	audit_syscall_entry(regs->syscallno, regs->orig_x0, regs->regs[1],
4913c59890b077 Eric Paris        2014-09-23  1870  			    regs->regs[2], regs->regs[3]);
5701ede884c222 AKASHI Takahiro   2014-07-04  1871  
478fcb2cdb2351 Will Deacon       2012-03-05  1872  	return regs->syscallno;
478fcb2cdb2351 Will Deacon       2012-03-05  1873  }
3157858feff891 AKASHI Takahiro   2014-04-30  1874  

:::::: The code at line 1863 was first introduced by commit
:::::: fefad9ef58ffc228f7b78b667c2aea8267503350 seccomp: simplify secure_computing()

:::::: TO: Christian Brauner <christian.brauner@...ntu.com>
:::::: CC: Kees Cook <keescook@...omium.org>

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

Download attachment ".config.gz" of type "application/gzip" (8164 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ