tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master head: bc63de6e6ba0b16652c5fb4b9c9916b9e7ca1f23 commit: a04a1198088a1378d0389c250cc684f649bcc91e [675/6165] LSM: syscalls for current process attributes config: s390-randconfig-r122-20231210 (https://download.01.org/0day-ci/archive/20231210/202312101020.yura5Jmf-lkp@xxxxxxxxx/config) compiler: s390-linux-gcc (GCC) 13.2.0 reproduce: (https://download.01.org/0day-ci/archive/20231210/202312101020.yura5Jmf-lkp@xxxxxxxxx/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp@xxxxxxxxx> | Closes: https://lore.kernel.org/oe-kbuild-all/202312101020.yura5Jmf-lkp@xxxxxxxxx/ sparse warnings: (new ones prefixed by >>) >> security/lsm_syscalls.c:31:1: sparse: sparse: Using plain integer as NULL pointer >> security/lsm_syscalls.c:31:1: sparse: sparse: Using plain integer as NULL pointer security/lsm_syscalls.c:53:1: sparse: sparse: Using plain integer as NULL pointer security/lsm_syscalls.c:53:1: sparse: sparse: Using plain integer as NULL pointer security/lsm_syscalls.c:53:1: sparse: sparse: Using plain integer as NULL pointer security/lsm_syscalls.c:53:1: sparse: sparse: Using plain integer as NULL pointer vim +31 security/lsm_syscalls.c 19 20 /** 21 * sys_lsm_set_self_attr - Set current task's security module attribute 22 * @attr: which attribute to set 23 * @ctx: the LSM contexts 24 * @size: size of @ctx 25 * @flags: reserved for future use 26 * 27 * Sets the calling task's LSM context. On success this function 28 * returns 0. If the attribute specified cannot be set a negative 29 * value indicating the reason for the error is returned. 30 */ > 31 SYSCALL_DEFINE4(lsm_set_self_attr, unsigned int, attr, struct lsm_ctx __user *, 32 ctx, size_t, size, u32, flags) 33 { 34 return security_setselfattr(attr, ctx, size, flags); 35 } 36 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki