All of lore.kernel.org
 help / color / mirror / Atom feed
* Re: [PATCH v33 07/29] LSM: Use lsmblob in security_kernel_act_as
@ 2022-03-11 23:05 kernel test robot
  0 siblings, 0 replies; 83+ messages in thread
From: kernel test robot @ 2022-03-11 23:05 UTC (permalink / raw)
  To: kbuild

[-- Attachment #1: Type: text/plain, Size: 3085 bytes --]

CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
In-Reply-To: <20220310234632.16194-8-casey@schaufler-ca.com>
References: <20220310234632.16194-8-casey@schaufler-ca.com>
TO: Casey Schaufler <casey@schaufler-ca.com>
TO: casey.schaufler(a)intel.com
TO: jmorris(a)namei.org
TO: linux-security-module(a)vger.kernel.org
TO: selinux(a)vger.kernel.org
CC: casey(a)schaufler-ca.com
CC: linux-audit(a)redhat.com
CC: keescook(a)chromium.org
CC: john.johansen(a)canonical.com
CC: penguin-kernel(a)i-love.sakura.ne.jp
CC: paul(a)paul-moore.com
CC: stephen.smalley.work(a)gmail.com
CC: linux-kernel(a)vger.kernel.org

Hi Casey,

I love your patch! Perhaps something to improve:

[auto build test WARNING on pcmoore-audit/next]
[also build test WARNING on linus/master v5.17-rc7]
[cannot apply to pcmoore-selinux/next jmorris-security/next-testing next-20220310]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch]

url:    https://github.com/0day-ci/linux/commits/Casey-Schaufler/integrity-disassociate-ima_filter_rule-from-security_audit_rule/20220311-084644
base:   https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/audit.git next
:::::: branch date: 22 hours ago
:::::: commit date: 22 hours ago
config: x86_64-randconfig-m001 (https://download.01.org/0day-ci/archive/20220312/202203120725.qzDgIYI3-lkp(a)intel.com/config)
compiler: gcc-9 (Ubuntu 9.4.0-1ubuntu1~20.04) 9.4.0

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>

smatch warnings:
include/linux/security.h:168 lsmblob_init() warn: we never enter this loop

vim +168 include/linux/security.h

9fb0768247631e3 Casey Schaufler 2022-03-10  156  
9fb0768247631e3 Casey Schaufler 2022-03-10  157  /**
9fb0768247631e3 Casey Schaufler 2022-03-10  158   * lsmblob_init - initialize a lsmblob structure
9fb0768247631e3 Casey Schaufler 2022-03-10  159   * @blob: Pointer to the data to initialize
9fb0768247631e3 Casey Schaufler 2022-03-10  160   * @secid: The initial secid value
9fb0768247631e3 Casey Schaufler 2022-03-10  161   *
9fb0768247631e3 Casey Schaufler 2022-03-10  162   * Set all secid for all modules to the specified value.
9fb0768247631e3 Casey Schaufler 2022-03-10  163   */
9fb0768247631e3 Casey Schaufler 2022-03-10  164  static inline void lsmblob_init(struct lsmblob *blob, u32 secid)
9fb0768247631e3 Casey Schaufler 2022-03-10  165  {
9fb0768247631e3 Casey Schaufler 2022-03-10  166  	int i;
9fb0768247631e3 Casey Schaufler 2022-03-10  167  
9fb0768247631e3 Casey Schaufler 2022-03-10 @168  	for (i = 0; i < LSMBLOB_ENTRIES; i++)
9fb0768247631e3 Casey Schaufler 2022-03-10  169  		blob->secid[i] = secid;
9fb0768247631e3 Casey Schaufler 2022-03-10  170  }
9fb0768247631e3 Casey Schaufler 2022-03-10  171  

---
0-DAY CI Kernel Test Service
https://lists.01.org/hyperkitty/list/kbuild-all(a)lists.01.org

^ permalink raw reply	[flat|nested] 83+ messages in thread

end of thread, other threads:[~2022-03-16  1:08 UTC | newest]

Thread overview: 83+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <20220310234632.16194-1-casey.ref@schaufler-ca.com>
2022-03-10 23:46 ` [PATCH v33 00/29] LSM: Module stacking for AppArmor Casey Schaufler
2022-03-10 23:46   ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 01/29] integrity: disassociate ima_filter_rule from security_audit_rule Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-11 10:48     ` kernel test robot
2022-03-11 10:48       ` kernel test robot
2022-03-10 23:46   ` [PATCH v33 02/29] LSM: Infrastructure management of the sock security Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 03/29] LSM: Add the lsmblob data structure Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 04/29] LSM: provide lsm name and id slot mappings Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 05/29] IMA: avoid label collisions with stacked LSMs Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 06/29] LSM: Use lsmblob in security_audit_rule_match Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 07/29] LSM: Use lsmblob in security_kernel_act_as Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 08/29] LSM: Use lsmblob in security_secctx_to_secid Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 09/29] LSM: Use lsmblob in security_secid_to_secctx Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 10/29] LSM: Use lsmblob in security_ipc_getsecid Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 11/29] LSM: Use lsmblob in security_current_getsecid Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 12/29] LSM: Use lsmblob in security_inode_getsecid Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 13/29] LSM: Use lsmblob in security_cred_getsecid Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-11  7:52     ` kernel test robot
2022-03-11  7:52       ` kernel test robot
2022-03-11  9:16     ` kernel test robot
2022-03-11  9:16       ` kernel test robot
2022-03-12  4:50     ` kernel test robot
2022-03-12  4:50       ` kernel test robot
2022-03-10 23:46   ` [PATCH v33 14/29] LSM: Specify which LSM to display Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 15/29] LSM: Ensure the correct LSM context releaser Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 16/29] LSM: Use lsmcontext in security_secid_to_secctx Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 17/29] LSM: Use lsmcontext in security_inode_getsecctx Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 18/29] LSM: security_secid_to_secctx in netlink netfilter Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 19/29] NET: Store LSM netlabel data in a lsmblob Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 20/29] binder: Pass LSM identifier for confirmation Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 21/29] LSM: Extend security_secid_to_secctx to include module selection Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 22/29] Audit: Keep multiple LSM data in audit_names Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 23/29] Audit: Create audit_stamp structure Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 24/29] LSM: Add a function to report multiple LSMs Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 25/29] Audit: Allow multiple records in an audit_buffer Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-15 23:47     ` Paul Moore
2022-03-15 23:47       ` Paul Moore
2022-03-16  0:06       ` Casey Schaufler
2022-03-16  0:06         ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 26/29] Audit: Add record for multiple task security contexts Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-15 23:47     ` Paul Moore
2022-03-15 23:47       ` Paul Moore
2022-03-16  0:17       ` Casey Schaufler
2022-03-16  0:17         ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 27/29] Audit: Add record for multiple object " Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-15 23:47     ` Paul Moore
2022-03-15 23:47       ` Paul Moore
2022-03-16  0:23       ` Casey Schaufler
2022-03-16  0:23         ` Casey Schaufler
2022-03-16  1:08         ` Paul Moore
2022-03-16  1:08           ` Paul Moore
2022-03-10 23:46   ` [PATCH v33 28/29] LSM: Add /proc attr entry for full LSM context Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-10 23:46   ` [PATCH v33 29/29] AppArmor: Remove the exclusive flag Casey Schaufler
2022-03-10 23:46     ` Casey Schaufler
2022-03-11 23:05 [PATCH v33 07/29] LSM: Use lsmblob in security_kernel_act_as kernel test robot

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.