lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 13 Jun 2024 13:36:06 -0400
From: Paul Moore <paul@...l-moore.com>
To: Naresh Kamboju <naresh.kamboju@...aro.org>
Cc: open list <linux-kernel@...r.kernel.org>, 
	Linux ARM <linux-arm-kernel@...ts.infradead.org>, lkft-triage@...ts.linaro.org, 
	Linux Regressions <regressions@...ts.linux.dev>, Arnd Bergmann <arnd@...db.de>, 
	Dan Carpenter <dan.carpenter@...aro.org>, GUO Zihua <guozihua@...wei.com>, 
	John Johansen <john.johansen@...onical.com>, Mimi Zohar <zohar@...ux.ibm.com>, 
	Casey Schaufler <casey@...aufler-ca.com>, linux-security-module@...r.kernel.org
Subject: Re: security: ima_policy.c:427:17: error: too many arguments to
 function 'ima_filter_rule_init'

On Thu, Jun 13, 2024 at 8:43 AM Naresh Kamboju
<naresh.kamboju@...aro.org> wrote:
>
> The arm and arm64 kselftests builds started failing on Linux next-20240613 tag.
> Please find the build log and related links below.
>
> Reported-by: Linux Kernel Functional Testing <lkft@...aro.org>

Thank you, the same error was reported by the kernel test robot
overnight.  I'm going to look at it today, I suspect it is a conflict
between the LSM and IMA/EVM branches.  FWIW, I compiled and booted a
kernel using the LSM changes yesterday without problem.

> Build error:
> --------
> security/integrity/ima/ima_policy.c: In function 'ima_lsm_copy_rule':
> security/integrity/ima/ima_policy.c:427:17: error: too many arguments
> to function 'ima_filter_rule_init'
>   427 |                 ima_filter_rule_init(nentry->lsm[i].type, Audit_equal,
>       |                 ^~~~~~~~~~~~~~~~~~~~

-- 
paul-moore.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ