tree:
https://git.kernel.org/pub/scm/linux/kernel/git/tglx/devel.git x86/entry
head: a55e3844bc8afc350ee4efd87442c9c74f101b34
commit: 33fc3bf31b1cdcd30ac597ada8f52c458df313a0 [11/16] x86/entry: Use generic syscall
entry function
config: i386-allnoconfig (attached as .config)
compiler: gcc-9 (Debian 9.3.0-14) 9.3.0
reproduce (this is a W=1 build):
git checkout 33fc3bf31b1cdcd30ac597ada8f52c458df313a0
# save the attached .config to linux build tree
make W=1 ARCH=i386
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp(a)intel.com>
All errors (new ones prefixed by >>):
kernel/entry/common.c: In function 'syscall_trace_enter':
> kernel/entry/common.c:58:9: error: implicit declaration of
function '__secure_computing'; did you mean 'secure_computing'?
[-Werror=implicit-function-declaration]
58 | ret =
__secure_computing(NULL);
| ^~~~~~~~~~~~~~~~~~
| secure_computing
cc1: some warnings being treated as errors
vim +58 kernel/entry/common.c
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 43
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 44 static long syscall_trace_enter(struct
pt_regs *regs, long syscall,
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 45 unsigned long ti_work)
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 46 {
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 47 long ret = 0;
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 48
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 49 /* Handle ptrace */
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 50 if (ti_work & (_TIF_SYSCALL_TRACE |
_TIF_SYSCALL_EMU)) {
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 51 ret =
arch_syscall_enter_tracehook(regs);
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 52 if (ret || (ti_work &
_TIF_SYSCALL_EMU))
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 53 return -1L;
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 54 }
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 55
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 56 /* Do seccomp after ptrace, to catch any
tracer changes. */
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 57 if (ti_work & _TIF_SECCOMP) {
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 @58 ret = __secure_computing(NULL);
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 59 if (ret == -1L)
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 60 return ret;
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 61 }
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 62
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 63 if (unlikely(ti_work &
_TIF_SYSCALL_TRACEPOINT))
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 64 trace_sys_enter(regs, syscall);
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 65
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 66 syscall_enter_audit(regs, syscall);
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 67
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 68 return ret ? : syscall;
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 69 }
6bc1ebbba2b814 Thomas Gleixner 2020-07-16 70
:::::: The code at line 58 was first introduced by commit
:::::: 6bc1ebbba2b814071ed298e9846293f7bc5e9e29 entry: Provide generic syscall entry
functionality
:::::: TO: Thomas Gleixner <tglx(a)linutronix.de>
:::::: CC: Thomas Gleixner <tglx(a)linutronix.de>
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org