diff options
author | Nathan Chancellor <[email protected]> | 2020-10-06 13:11:15 -0700 |
---|---|---|
committer | Greg Kroah-Hartman <[email protected]> | 2020-10-07 09:23:39 +0200 |
commit | 200da27ab32d89ca43bd8ef010f84b205e5c780a (patch) | |
tree | b89c08dc008328a98638c8aabda8cdb97e1ec5a1 /tools/testing/selftests/bpf/prog_tests/sockmap_basic.c | |
parent | 2827d98bc5d65ebfa78cfa32ebddea3a6f60f56d (diff) |
LSM: Fix type of id parameter in kernel_post_load_data prototype
Clang warns:
security/security.c:1716:59: warning: implicit conversion from
enumeration type 'enum kernel_load_data_id' to different enumeration
type 'enum kernel_read_file_id' [-Wenum-conversion]
ret = call_int_hook(kernel_post_load_data, 0, buf, size, id,
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~
security/security.c:715:22: note: expanded from macro 'call_int_hook'
RC = P->hook.FUNC(__VA_ARGS__); \
~ ^~~~~~~~~~~
1 warning generated.
There is a mismatch between the id parameter type in
security_kernel_post_load_data and the function pointer prototype that
is created by the LSM_HOOK macro in the security_list_options union. Fix
the type in the LSM_HOOK macro as 'enum kernel_load_data_id' is what is
expected.
Fixes: b64fcae74b6d ("LSM: Introduce kernel_post_load_data() hook")
Acked-by: Kees Cook <[email protected]>
Signed-off-by: Nathan Chancellor <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Greg Kroah-Hartman <[email protected]>
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/sockmap_basic.c')
0 files changed, 0 insertions, 0 deletions