tree:   https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git x86/entry
head:   72c3c0fe54a3f3ddea8f5ca468ddf9deaf2100b7
commit: 27d6b4d14f5c3ab21c4aef87dd04055a2d7adf14 [10/15] x86/entry: Use generic 
syscall entry function
config: i386-randconfig-s001-20200727 (attached as .config)
compiler: gcc-9 (Debian 9.3.0-14) 9.3.0
reproduce:
        # apt-get install sparse
        # sparse version: v0.6.2-94-geb6779f6-dirty
        git checkout 27d6b4d14f5c3ab21c4aef87dd04055a2d7adf14
        # save the attached .config to linux build tree
        make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' ARCH=i386 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <l...@intel.com>


sparse warnings: (new ones prefixed by >>)

>> kernel/entry/common.c:58:41: sparse: sparse: too many arguments for function 
>> __secure_computing

vim +58 kernel/entry/common.c

142781e108b13b Thomas Gleixner 2020-07-22  43  
142781e108b13b Thomas Gleixner 2020-07-22  44  static long 
syscall_trace_enter(struct pt_regs *regs, long syscall,
142781e108b13b Thomas Gleixner 2020-07-22  45                           
unsigned long ti_work)
142781e108b13b Thomas Gleixner 2020-07-22  46  {
142781e108b13b Thomas Gleixner 2020-07-22  47   long ret = 0;
142781e108b13b Thomas Gleixner 2020-07-22  48  
142781e108b13b Thomas Gleixner 2020-07-22  49   /* Handle ptrace */
142781e108b13b Thomas Gleixner 2020-07-22  50   if (ti_work & 
(_TIF_SYSCALL_TRACE | _TIF_SYSCALL_EMU)) {
142781e108b13b Thomas Gleixner 2020-07-22  51           ret = 
arch_syscall_enter_tracehook(regs);
142781e108b13b Thomas Gleixner 2020-07-22  52           if (ret || (ti_work & 
_TIF_SYSCALL_EMU))
142781e108b13b Thomas Gleixner 2020-07-22  53                   return -1L;
142781e108b13b Thomas Gleixner 2020-07-22  54   }
142781e108b13b Thomas Gleixner 2020-07-22  55  
142781e108b13b Thomas Gleixner 2020-07-22  56   /* Do seccomp after ptrace, to 
catch any tracer changes. */
142781e108b13b Thomas Gleixner 2020-07-22  57   if (ti_work & _TIF_SECCOMP) {
142781e108b13b Thomas Gleixner 2020-07-22 @58           ret = 
__secure_computing(NULL);
142781e108b13b Thomas Gleixner 2020-07-22  59           if (ret == -1L)
142781e108b13b Thomas Gleixner 2020-07-22  60                   return ret;
142781e108b13b Thomas Gleixner 2020-07-22  61   }
142781e108b13b Thomas Gleixner 2020-07-22  62  
142781e108b13b Thomas Gleixner 2020-07-22  63   if (unlikely(ti_work & 
_TIF_SYSCALL_TRACEPOINT))
142781e108b13b Thomas Gleixner 2020-07-22  64           trace_sys_enter(regs, 
syscall);
142781e108b13b Thomas Gleixner 2020-07-22  65  
142781e108b13b Thomas Gleixner 2020-07-22  66   syscall_enter_audit(regs, 
syscall);
142781e108b13b Thomas Gleixner 2020-07-22  67  
142781e108b13b Thomas Gleixner 2020-07-22  68   return ret ? : syscall;
142781e108b13b Thomas Gleixner 2020-07-22  69  }
142781e108b13b Thomas Gleixner 2020-07-22  70  

:::::: The code at line 58 was first introduced by commit
:::::: 142781e108b13b2b0e8f035cfb5bfbbc8f14d887 entry: Provide generic syscall 
entry functionality

:::::: TO: Thomas Gleixner <t...@linutronix.de>
:::::: CC: Thomas Gleixner <t...@linutronix.de>

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-...@lists.01.org

Attachment: .config.gz
Description: application/gzip

Reply via email to