Hi Tetsuo, kernel test robot noticed the following build errors: [auto build test ERROR on bpf/master] [also build test ERROR on pcmoore-audit/next pcmoore-selinux/next linus/master v6.7-rc2] [cannot apply to bpf-next/master next-20231120] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/Tetsuo-Handa/LSM-Auto-undef-LSM_HOOK-macro/20231120-214522 base: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git master patch link: https://lore.kernel.org/r/34be5cd8-1fdd-4323-82a3-40f2e7d35db3%40I-love.SAKURA.ne.jp patch subject: [PATCH 4/4] LSM: Add a LSM module which handles dynamically appendable LSM hooks. config: csky-randconfig-002-20231121 (https://download.01.org/0day-ci/archive/20231121/202311210651.Bs3e5XsM-lkp@xxxxxxxxx/config) compiler: csky-linux-gcc (GCC) 13.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20231121/202311210651.Bs3e5XsM-lkp@xxxxxxxxx/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp@xxxxxxxxx> | Closes: https://lore.kernel.org/oe-kbuild-all/202311210651.Bs3e5XsM-lkp@xxxxxxxxx/ All errors (new ones prefixed by >>): csky-linux-ld: kernel/bpf/syscall.o: in function `__bpf_prog_put_rcu': >> syscall.c:(.text+0x844): undefined reference to `security_bpf_prog_free' >> csky-linux-ld: syscall.c:(.text+0x87c): undefined reference to `security_bpf_prog_free' csky-linux-ld: kernel/bpf/syscall.o: in function `__bpf_prog_put_noref': syscall.c:(.text+0x13a4): undefined reference to `security_bpf_prog_free' csky-linux-ld: syscall.c:(.text+0x13fc): undefined reference to `security_bpf_prog_free' csky-linux-ld: kernel/bpf/syscall.o: in function `bpf_map_free_deferred': >> syscall.c:(.text+0x3c0e): undefined reference to `security_bpf_map_free' csky-linux-ld: kernel/bpf/syscall.o: in function `map_check_btf': syscall.c:(.text+0x3ccc): undefined reference to `security_bpf_map_free' csky-linux-ld: kernel/bpf/syscall.o: in function `map_create': >> syscall.c:(.text+0x448a): undefined reference to `security_bpf_map_alloc' >> csky-linux-ld: syscall.c:(.text+0x4590): undefined reference to `security_bpf_map_alloc' >> csky-linux-ld: syscall.c:(.text+0x46d0): undefined reference to `security_bpf_map_free' csky-linux-ld: syscall.c:(.text+0x4724): undefined reference to `security_bpf_map_free' csky-linux-ld: kernel/bpf/syscall.o: in function `bpf_prog_load': >> syscall.c:(.text+0x4836): undefined reference to `security_bpf_prog_alloc' >> csky-linux-ld: syscall.c:(.text+0x48c4): undefined reference to `security_bpf_prog_alloc' csky-linux-ld: syscall.c:(.text+0x497e): undefined reference to `security_bpf_prog_free' csky-linux-ld: syscall.c:(.text+0x49f0): undefined reference to `security_bpf_prog_free' mm/zsmalloc.o: in function `__zs_compact': zsmalloc.c:(.text+0x2142): relocation truncated to fit: R_CKCORE_PCREL_IMM16BY4 against `__jump_table' zsmalloc.c:(.text+0x214a): relocation truncated to fit: R_CKCORE_PCREL_IMM16BY4 against `__jump_table' mm/zsmalloc.o: in function `zs_compact': zsmalloc.c:(.text+0x218a): relocation truncated to fit: R_CKCORE_PCREL_IMM16BY4 against `__jump_table' zsmalloc.c:(.text+0x21ca): relocation truncated to fit: R_CKCORE_PCREL_IMM16BY4 against `__jump_table' zsmalloc.c:(.text+0x21d8): relocation truncated to fit: R_CKCORE_PCREL_IMM16BY4 against `__jump_table' mm/zsmalloc.o: in function `zs_shrinker_scan': zsmalloc.c:(.text+0x21e4): relocation truncated to fit: R_CKCORE_PCREL_IMM16BY4 against `__jump_table' mm/zsmalloc.o: in function `zs_page_migrate': zsmalloc.c:(.text+0x2234): relocation truncated to fit: R_CKCORE_PCREL_IMM16BY4 against `__jump_table' zsmalloc.c:(.text+0x224c): relocation truncated to fit: R_CKCORE_PCREL_IMM16BY4 against `__jump_table' zsmalloc.c:(.text+0x2278): relocation truncated to fit: R_CKCORE_PCREL_IMM16BY4 against `__jump_table' zsmalloc.c:(.text+0x22a2): relocation truncated to fit: R_CKCORE_PCREL_IMM16BY4 against `__jump_table' zsmalloc.c:(.text+0x22b0): additional relocation overflows omitted from the output -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki