tree: https://git.kernel.org/pub/scm/linux/kernel/git/tglx/devel.git x86/entry head: a55e3844bc8afc350ee4efd87442c9c74f101b34 commit: 33fc3bf31b1cdcd30ac597ada8f52c458df313a0 [11/16] x86/entry: Use generic syscall entry function config: i386-allnoconfig (attached as .config) compiler: gcc-9 (Debian 9.3.0-14) 9.3.0 reproduce (this is a W=1 build): git checkout 33fc3bf31b1cdcd30ac597ada8f52c458df313a0 # save the attached .config to linux build tree make W=1 ARCH=i386 If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot All errors (new ones prefixed by >>): kernel/entry/common.c: In function 'syscall_trace_enter': >> kernel/entry/common.c:58:9: error: implicit declaration of function '__secure_computing'; did you mean 'secure_computing'? [-Werror=implicit-function-declaration] 58 | ret = __secure_computing(NULL); | ^~~~~~~~~~~~~~~~~~ | secure_computing cc1: some warnings being treated as errors vim +58 kernel/entry/common.c 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 43 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 44 static long syscall_trace_enter(struct pt_regs *regs, long syscall, 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 45 unsigned long ti_work) 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 46 { 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 47 long ret = 0; 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 48 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 49 /* Handle ptrace */ 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 50 if (ti_work & (_TIF_SYSCALL_TRACE | _TIF_SYSCALL_EMU)) { 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 51 ret = arch_syscall_enter_tracehook(regs); 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 52 if (ret || (ti_work & _TIF_SYSCALL_EMU)) 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 53 return -1L; 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 54 } 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 55 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 56 /* Do seccomp after ptrace, to catch any tracer changes. */ 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 57 if (ti_work & _TIF_SECCOMP) { 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 @58 ret = __secure_computing(NULL); 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 59 if (ret == -1L) 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 60 return ret; 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 61 } 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 62 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 63 if (unlikely(ti_work & _TIF_SYSCALL_TRACEPOINT)) 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 64 trace_sys_enter(regs, syscall); 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 65 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 66 syscall_enter_audit(regs, syscall); 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 67 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 68 return ret ? : syscall; 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 69 } 6bc1ebbba2b814 Thomas Gleixner 2020-07-16 70 :::::: The code at line 58 was first introduced by commit :::::: 6bc1ebbba2b814071ed298e9846293f7bc5e9e29 entry: Provide generic syscall entry functionality :::::: TO: Thomas Gleixner :::::: CC: Thomas Gleixner --- 0-DAY CI Kernel Test Service, Intel Corporation https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org