On Fri, 2018-02-23 at 08:21 +0800, kbuild test robot wrote: > tree: https://git.kernel.org/pub/scm/linux/kernel/git/pcmoore/selin > ux.git next > head: db97c9f9d31217e3e133056fe2bea76639f87ec1 > commit: db97c9f9d31217e3e133056fe2bea76639f87ec1 [5/5] selinux: Add > SCTP support > config: x86_64-allyesdebian (attached as .config) > compiler: gcc-7 (Debian 7.3.0-1) 7.3.0 > reproduce: > git checkout db97c9f9d31217e3e133056fe2bea76639f87ec1 > # save the attached .config to linux build tree > make ARCH=x86_64 > > All errors (new ones prefixed by >>): > > In file included from security/selinux/hooks.c:99:0: > > > security/selinux/include/netlabel.h:135:66: error: unknown type > > > name 'sock' > > static inline void selinux_netlbl_sctp_sk_clone(struct sock *sk, > sock *newsk) > > ^~~~ > security/selinux/hooks.c: In function 'selinux_sctp_sk_clone': > > > security/selinux/hooks.c:5182:2: error: implicit declaration of > > > function 'selinux_netlbl_sctp_sk_clone'; did you mean > > > 'selinux_netlbl_inet_csk_clone'? [-Werror=implicit-function- > > > declaration] > > selinux_netlbl_sctp_sk_clone(sk, newsk); > ^~~~~~~~~~~~~~~~~~~~~~~~~~~~ > selinux_netlbl_inet_csk_clone > cc1: some warnings being treated as errors > -- > In file included from security/selinux/ss/services.c:68:0: > > > security/selinux/include/netlabel.h:135:66: error: unknown type > > > name 'sock' > > static inline void selinux_netlbl_sctp_sk_clone(struct sock *sk, > sock *newsk) > > ^~~~ > -- > In file included from security//selinux/hooks.c:99:0: > > > security/selinux/include/netlabel.h:135:66: error: unknown type > > > name 'sock' > > static inline void selinux_netlbl_sctp_sk_clone(struct sock *sk, > sock *newsk) > > ^~~~ > security//selinux/hooks.c: In function 'selinux_sctp_sk_clone': > security//selinux/hooks.c:5182:2: error: implicit declaration of > function 'selinux_netlbl_sctp_sk_clone'; did you mean > 'selinux_netlbl_inet_csk_clone'? [-Werror=implicit-function- > declaration] > selinux_netlbl_sctp_sk_clone(sk, newsk); > ^~~~~~~~~~~~~~~~~~~~~~~~~~~~ > selinux_netlbl_inet_csk_clone > cc1: some warnings being treated as errors > > vim +/sock +135 security/selinux/include/netlabel.h > > 120 > 121 static inline int > selinux_netlbl_sctp_assoc_request(struct sctp_endpoint *ep, > 122 str > uct sk_buff *skb) > 123 { > 124 return 0; > 125 } > 126 static inline int > selinux_netlbl_inet_conn_request(struct request_sock *req, > 127 u16 > family) > 128 { > 129 return 0; > 130 } > 131 static inline void selinux_netlbl_inet_csk_clone(struct > sock *sk, u16 family) > 132 { > 133 return; > 134 } > > 135 static inline void selinux_netlbl_sctp_sk_clone(struct > sock *sk, sock *newsk) Paul, Would you like a new selinux-Add-SCTP-support.patch to fix this. > 136 { > 137 return; > 138 } > 139 static inline int > selinux_netlbl_socket_post_create(struct sock *sk, > 140 u16 > family) > 141 { > 142 return 0; > 143 } > 144 static inline int selinux_netlbl_sock_rcv_skb(struct > sk_security_struct *sksec, > 145 struct > sk_buff *skb, > 146 u16 > family, > 147 struct > common_audit_data *ad) > 148 { > 149 return 0; > 150 } > 151 static inline int > selinux_netlbl_socket_setsockopt(struct socket *sock, > 152 int > level, > 153 int > optname) > 154 { > 155 return 0; > 156 } > 157 static inline int selinux_netlbl_socket_connect(struct > sock *sk, > 158 struct > sockaddr *addr) > 159 { > 160 return 0; > 161 } > 162 static inline int > selinux_netlbl_socket_connect_locked(struct sock *sk, > 163 > struct sockaddr *addr) > 164 { > 165 return 0; > 166 } > 167 #endif /* CONFIG_NETLABEL */ > 168 > > --- > 0-DAY kernel test infrastructure Open Source > Technology Center > https://lists.01.org/pipermail/kbuild-all Intel > Corporation