Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp892576img; Fri, 22 Mar 2019 10:47:25 -0700 (PDT) X-Google-Smtp-Source: APXvYqzYIkiaSGPkZcpowxXk/tVizeZfg6hiT46WbPjnmzawWk3uFS60eDDULyi0UIeFdMCTrk7K X-Received: by 2002:a65:4981:: with SMTP id r1mr10143313pgs.62.1553276845380; Fri, 22 Mar 2019 10:47:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553276845; cv=none; d=google.com; s=arc-20160816; b=k86grKOAPlGxaegqb1yZdb7xsbhaecnpfHdXF3b4OWNC8QCpx1P4KH2bqjkw33ye8f 5qzSQToJSCUTIrN2fqTo8/8lsLURt8A61p+UDcm/RM4Vkm/QjktX1oRUN3ZPtn7PmEDf 75h+Ltix+VN4p7qLRK7rfkP/PZ0kefixN2sUEDPyNpACCGwc3Ec8Tv9oor4ZN77lNf5n kkR6B4o0dU5WS4n+GcnKJvwrVetf3oQ7FIFdjwquM0Z2B+9UlQSj+jLiaLbtnbtGIJdM /G0zUHApDiesYEokglUHhPx91Teyp9d5VAfx8XN9Gi5me2TJP/eDIzWRvtq7amFC1Y/6 zRZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version; bh=lzc6LE9HVzd84KZHDBHVC0MPhSeqCkINOUAJe9Tde7M=; b=CnvTrVtMJkLpMuqF5XBOxxEogYw4AqLTNGnNzU3hKlX8KoZcvIvaBrnq7GPAoDb0r9 XbwBTF1J0cvluMZzrhv353tXTfmnGciLVvzMFNmc/98ECwWPkB88WD8e7v8F2mMkiy6Y GxvhH7tbzdVwoDuAavvq64eD3s1fKGU7Bf7P2QtA0QcKnqutNhqgTRhbOfO9VgmiUnf7 T17C+NDt7HVxO5J63Jqo+2mWdoOdRdjNH1gHpceluXr+7kd6nx4FxLCl1i0LsA0+9HPt WocRQGvhnkU/zxXtqFy1gvVwilePp22coJyqXRQTJQ06BR7mtPHLuLg4QCp583C/vYiX lu2w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 39si7641706pla.214.2019.03.22.10.47.07; Fri, 22 Mar 2019 10:47:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728028AbfCVRqO (ORCPT + 99 others); Fri, 22 Mar 2019 13:46:14 -0400 Received: from mail-ot1-f67.google.com ([209.85.210.67]:44362 "EHLO mail-ot1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727871AbfCVRqL (ORCPT ); Fri, 22 Mar 2019 13:46:11 -0400 Received: by mail-ot1-f67.google.com with SMTP id d24so2631036otl.11 for ; Fri, 22 Mar 2019 10:46:10 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=lzc6LE9HVzd84KZHDBHVC0MPhSeqCkINOUAJe9Tde7M=; b=fneu7ieJBq2zlEFTT0b8St8BJaPZlxJy8ajwu2e41pMHfIb5X8G5mI+HxPIZfrvh3z bpwPdOpDbzftiKmtV1WSN2RcBAsIOzOevXTGDwgmRqhwdQT6U7hQKO4Ktzx6ojvJ3DCx 3/cSmIl0ZF6ukryMIELICZ4X2ROc9Z27ISvsU4q+EEs3m2b83KHFSJkLlwwiXp0O5C87 LQsAIVm6UBU8EKqcBnNl7Ah+kQVmoX/76OWBoRUNYGY8zVa+1/2slfzOek2R9wJcDyTE 8VEbDCrebPLzP4T5/ZHcTLk7xESt1wPEX3E7KnA1kKSqZ6XPZu0oMkswjHj8NmnsmV32 uc6g== X-Gm-Message-State: APjAAAWPd/Ei7/hYTJKWr617XXqjLXJnTIFWqSJqa/2A2cZIoRVXvGfM c7te1l1RR4qjkoThtajY09UANlUxYSK//Hva42uKZ2518nY= X-Received: by 2002:a9d:7591:: with SMTP id s17mr7478512otk.52.1553276770150; Fri, 22 Mar 2019 10:46:10 -0700 (PDT) MIME-Version: 1.0 References: <20190322140400.18892-1-yuehaibing@huawei.com> In-Reply-To: <20190322140400.18892-1-yuehaibing@huawei.com> From: Ondrej Mosnacek Date: Fri, 22 Mar 2019 18:45:59 +0100 Message-ID: Subject: Re: [PATCH -next] selinux: Make selinux_kernfs_init_security static To: Yue Haibing Cc: Paul Moore , Stephen Smalley , Eric Paris , Linux kernel mailing list , selinux@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 22, 2019 at 3:04 PM Yue Haibing wrote: > From: YueHaibing > > Fix sparse warning: > > security/selinux/hooks.c:3389:5: warning: > symbol 'selinux_kernfs_init_security' was not declared. Should it be static? > > Signed-off-by: YueHaibing Yup, another trivial mistake on my part... Acked-by: Ondrej Mosnacek Thanks for catching that! > --- > security/selinux/hooks.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c > index ab4b049..b6e6152 100644 > --- a/security/selinux/hooks.c > +++ b/security/selinux/hooks.c > @@ -3386,8 +3386,8 @@ static int selinux_inode_copy_up_xattr(const char *name) > > /* kernfs node operations */ > > -int selinux_kernfs_init_security(struct kernfs_node *kn_dir, > - struct kernfs_node *kn) > +static int selinux_kernfs_init_security(struct kernfs_node *kn_dir, > + struct kernfs_node *kn) > { > const struct task_security_struct *tsec = current_security(); > u32 parent_sid, newsid, clen; > -- > 2.7.0 -- Ondrej Mosnacek Software Engineer, Security Technologies Red Hat, Inc.