linux-next.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* linux-next: build failure after merge of the security-testing tree
@ 2010-07-30  2:06 Stephen Rothwell
  2010-07-30  3:54 ` James Morris
  0 siblings, 1 reply; 17+ messages in thread
From: Stephen Rothwell @ 2010-07-30  2:06 UTC (permalink / raw)
  To: James Morris; +Cc: linux-next, linux-kernel, John Johansen

[-- Attachment #1: Type: text/plain, Size: 540 bytes --]

Hi James,

After merging the security-testing tree, today's linux-next build
(powerpc ppc64_defconfig) failed like this:

security/Kconfig:144: can't open file "security/apparmor/Kconfig"

Caused by commit 32bd8e5273c0be4189274ab55c4d16862f0dd87d ("AppArmor:
Enable configuring and building of the AppArmor security module").  Looks
like a file was missed.

I have used the security-testing from next-20100729 for today.
-- 
Cheers,
Stephen Rothwell                    sfr@canb.auug.org.au
http://www.canb.auug.org.au/~sfr/

[-- Attachment #2: Type: application/pgp-signature, Size: 490 bytes --]

^ permalink raw reply	[flat|nested] 17+ messages in thread
* linux-next: build failure after merge of the security-testing tree
@ 2010-08-02  2:16 Stephen Rothwell
  2010-08-03  0:04 ` John Johansen
  0 siblings, 1 reply; 17+ messages in thread
From: Stephen Rothwell @ 2010-08-02  2:16 UTC (permalink / raw)
  To: James Morris; +Cc: linux-next, linux-kernel, John Johansen, Rusty Russell

Hi James,

After merging the security-testing tree, today's linux-next build (x86_64
allmodconfig) failed like this (also some warnings ...):

security/apparmor/ipc.c: In function 'aa_ptrace':
security/apparmor/ipc.c:103: warning: initialization discards qualifiers from pointer target type
security/apparmor/domain.c: In function 'may_change_ptraced_domain':
security/apparmor/domain.c:73: warning: assignment discards qualifiers from pointer target type
security/apparmor/lsm.c:701: error: 'param_ops_aabool' undeclared here (not in a function)
security/apparmor/lsm.c:721: error: 'param_ops_aalockpolicy' undeclared here (not in a function)
security/apparmor/lsm.c:729: error: 'param_ops_aauint' undeclared here (not in a function)

Error caused by commit e0500000b50a50ec8cc9967001f3ed201b83cb36
("AppArmor: LSM interface, and security module initialization")
interacting with commit 0685652df0929cec7d78efa85127f6eb34962132
("param:param_ops") from the rr tree.

I applied the following merge fix patch:

From: Stephen Rothwell <sfr@canb.auug.org.au>
Date: Mon, 2 Aug 2010 12:00:43 +1000
Subject: [PATCH] AppArmor: update for module_param_named API change

Signed-off-by: Stephen Rothwell <sfr@canb.auug.org.au>
---
 security/apparmor/lsm.c |   36 ++++++++++++++++++++++++------------
 1 files changed, 24 insertions(+), 12 deletions(-)

diff --git a/security/apparmor/lsm.c b/security/apparmor/lsm.c
index 8db33a8..d5666d3 100644
--- a/security/apparmor/lsm.c
+++ b/security/apparmor/lsm.c
@@ -667,17 +667,29 @@ static struct security_operations apparmor_ops = {
  * AppArmor sysfs module parameters
  */
 
-static int param_set_aabool(const char *val, struct kernel_param *kp);
-static int param_get_aabool(char *buffer, struct kernel_param *kp);
+static int param_set_aabool(const char *val, const struct kernel_param *kp);
+static int param_get_aabool(char *buffer, const struct kernel_param *kp);
 #define param_check_aabool(name, p) __param_check(name, p, int)
+static struct kernel_param_ops param_ops_aabool = {
+	.set = param_set_aabool,
+	.get = param_get_aabool
+};
 
-static int param_set_aauint(const char *val, struct kernel_param *kp);
-static int param_get_aauint(char *buffer, struct kernel_param *kp);
+static int param_set_aauint(const char *val, const struct kernel_param *kp);
+static int param_get_aauint(char *buffer, const struct kernel_param *kp);
 #define param_check_aauint(name, p) __param_check(name, p, int)
+static struct kernel_param_ops param_ops_aauint = {
+	.set = param_set_aauint,
+	.get = param_get_aauint
+};
 
-static int param_set_aalockpolicy(const char *val, struct kernel_param *kp);
-static int param_get_aalockpolicy(char *buffer, struct kernel_param *kp);
+static int param_set_aalockpolicy(const char *val, const struct kernel_param *kp);
+static int param_get_aalockpolicy(char *buffer, const struct kernel_param *kp);
 #define param_check_aalockpolicy(name, p) __param_check(name, p, int)
+static struct kernel_param_ops param_ops_aalockpolicy = {
+	.set = param_set_aalockpolicy,
+	.get = param_get_aalockpolicy
+};
 
 static int param_set_audit(const char *val, struct kernel_param *kp);
 static int param_get_audit(char *buffer, struct kernel_param *kp);
@@ -751,7 +763,7 @@ static int __init apparmor_enabled_setup(char *str)
 __setup("apparmor=", apparmor_enabled_setup);
 
 /* set global flag turning off the ability to load policy */
-static int param_set_aalockpolicy(const char *val, struct kernel_param *kp)
+static int param_set_aalockpolicy(const char *val, const struct kernel_param *kp)
 {
 	if (!capable(CAP_MAC_ADMIN))
 		return -EPERM;
@@ -760,35 +772,35 @@ static int param_set_aalockpolicy(const char *val, struct kernel_param *kp)
 	return param_set_bool(val, kp);
 }
 
-static int param_get_aalockpolicy(char *buffer, struct kernel_param *kp)
+static int param_get_aalockpolicy(char *buffer, const struct kernel_param *kp)
 {
 	if (!capable(CAP_MAC_ADMIN))
 		return -EPERM;
 	return param_get_bool(buffer, kp);
 }
 
-static int param_set_aabool(const char *val, struct kernel_param *kp)
+static int param_set_aabool(const char *val, const struct kernel_param *kp)
 {
 	if (!capable(CAP_MAC_ADMIN))
 		return -EPERM;
 	return param_set_bool(val, kp);
 }
 
-static int param_get_aabool(char *buffer, struct kernel_param *kp)
+static int param_get_aabool(char *buffer, const struct kernel_param *kp)
 {
 	if (!capable(CAP_MAC_ADMIN))
 		return -EPERM;
 	return param_get_bool(buffer, kp);
 }
 
-static int param_set_aauint(const char *val, struct kernel_param *kp)
+static int param_set_aauint(const char *val, const struct kernel_param *kp)
 {
 	if (!capable(CAP_MAC_ADMIN))
 		return -EPERM;
 	return param_set_uint(val, kp);
 }
 
-static int param_get_aauint(char *buffer, struct kernel_param *kp)
+static int param_get_aauint(char *buffer, const struct kernel_param *kp)
 {
 	if (!capable(CAP_MAC_ADMIN))
 		return -EPERM;
-- 
1.7.1

-- 
Cheers,
Stephen Rothwell                    sfr@canb.auug.org.au
http://www.canb.auug.org.au/~sfr/

^ permalink raw reply related	[flat|nested] 17+ messages in thread
* linux-next: build failure after merge of the security-testing tree
@ 2010-10-19  3:57 Stephen Rothwell
  2010-10-19  4:09 ` Eric Paris
  0 siblings, 1 reply; 17+ messages in thread
From: Stephen Rothwell @ 2010-10-19  3:57 UTC (permalink / raw)
  To: James Morris
  Cc: linux-next, linux-kernel, Eric Paris, Paul Moore, Patrick McHardy

[-- Attachment #1: Type: text/plain, Size: 792 bytes --]

Hi James,

After merging the security-testing tree, today's linux-next build (powerpc_ppc64_defconfig)
failed like this:

net/netfilter/nf_conntrack_netlink.c: In function 'ctnetlink_conntrack_event':
net/netfilter/nf_conntrack_netlink.c:585: error: 'struct nf_conn' has no member named 'secmark'

Caused by commit fd0194de4cf2e64514aec35f40de458fca766656 ("conntrack:
export lsm context rather than internal secid via netlink").  This build
has CONFIG_NF_CONNTRACK_SECMARK not set ...

If you change a dependency on a CONFIG option, it is always worth build
testing with and without the option set.

I have used the security-testing tree from next-20101018 for today.
-- 
Cheers,
Stephen Rothwell                    sfr@canb.auug.org.au
http://www.canb.auug.org.au/~sfr/

[-- Attachment #2: Type: application/pgp-signature, Size: 490 bytes --]

^ permalink raw reply	[flat|nested] 17+ messages in thread
* linux-next: build failure after merge of the security-testing tree
@ 2011-06-29  3:48 Stephen Rothwell
  2011-06-29  4:16 ` Tetsuo Handa
  0 siblings, 1 reply; 17+ messages in thread
From: Stephen Rothwell @ 2011-06-29  3:48 UTC (permalink / raw)
  To: James Morris; +Cc: linux-next, linux-kernel, Tetsuo Handa

[-- Attachment #1: Type: text/plain, Size: 590 bytes --]

Hi James,

After merging the security-testing tree, today's linux-next build (x86_64
allmodconfig) failed like this:

security/built-in.o: In function `tomoyo_bprm_set_creds':
tomoyo.c:(.text+0x4698e): undefined reference to `tomoyo_load_policy'

I am not sure what caused this (but tomoyo_load_policy is guarded by
#ifndef CONFIG_SECURITY_TOMOYO_OMIT_USERSPACE_LOADER
and that is set in this build).

I have used the security-testing tree from next-20110628 for today.
-- 
Cheers,
Stephen Rothwell                    sfr@canb.auug.org.au
http://www.canb.auug.org.au/~sfr/

[-- Attachment #2: Type: application/pgp-signature, Size: 490 bytes --]

^ permalink raw reply	[flat|nested] 17+ messages in thread
* linux-next: build failure after merge of the security-testing tree
@ 2011-08-10  0:58 Stephen Rothwell
  2011-08-10  1:48 ` Mimi Zohar
  0 siblings, 1 reply; 17+ messages in thread
From: Stephen Rothwell @ 2011-08-10  0:58 UTC (permalink / raw)
  To: James Morris; +Cc: linux-next, linux-kernel, Mimi Zohar

Hi James,

After merging the security-testing tree, today's linux-next build
(powerpc ppc64_defconfig) failed like this:

fs/reiserfs/xattr_security.c: In function 'reiserfs_security_init':
fs/reiserfs/xattr_security.c:69:2: error: implicit declaration of function 'security_old_inode_init_security'

Caused by commit 9d8f13ba3f48 ("security: new
security_inode_init_security API adds function callback").  Forgotten
include?

I have used the security-testing tree from next-20110809 for today.
-- 
Cheers,
Stephen Rothwell                    sfr@canb.auug.org.au

^ permalink raw reply	[flat|nested] 17+ messages in thread
* linux-next: build failure after merge of the security-testing tree
@ 2011-08-12  2:47 Stephen Rothwell
  2011-08-15  4:04 ` Stephen Rothwell
  0 siblings, 1 reply; 17+ messages in thread
From: Stephen Rothwell @ 2011-08-12  2:47 UTC (permalink / raw)
  To: James Morris; +Cc: linux-next, linux-kernel, Mimi Zohar

[-- Attachment #1: Type: text/plain, Size: 902 bytes --]

Hi James,

After merging the security-testing tree, today's linux-next build
(powerpc ppc64_defconfig) failed like this:

init/mounts.o: In function `security_old_inode_init_security':
(.opd+0xf0): multiple definition of `security_old_inode_init_security'
init/main.o:(.opd+0x108): first defined here
init/mounts.o: In function `.security_old_inode_init_security':
(.text+0x50): multiple definition of `.security_old_inode_init_security'
init/main.o:(.text+0x110): first defined here

etc ... (lots and lots)

Casued by commit e1c9b23adbe8 ("evm: building without EVM enabled fixes").

Please, please, build test this stuff.  This is the same error that that
patch was supposed to fix but on another function ...

I have used the security-tree tree from next-20110809 again.
-- 
Cheers,
Stephen Rothwell                    sfr@canb.auug.org.au
http://www.canb.auug.org.au/~sfr/

[-- Attachment #2: Type: application/pgp-signature, Size: 490 bytes --]

^ permalink raw reply	[flat|nested] 17+ messages in thread

end of thread, other threads:[~2011-08-15  4:05 UTC | newest]

Thread overview: 17+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-07-30  2:06 linux-next: build failure after merge of the security-testing tree Stephen Rothwell
2010-07-30  3:54 ` James Morris
2010-07-30  6:01   ` Stephen Rothwell
2010-07-30  7:31   ` John Johansen
  -- strict thread matches above, loose matches on Subject: below --
2010-08-02  2:16 Stephen Rothwell
2010-08-03  0:04 ` John Johansen
2010-08-05  1:37   ` Stephen Rothwell
2010-10-19  3:57 Stephen Rothwell
2010-10-19  4:09 ` Eric Paris
2011-06-29  3:48 Stephen Rothwell
2011-06-29  4:16 ` Tetsuo Handa
2011-06-29  7:36   ` James Morris
2011-08-10  0:58 Stephen Rothwell
2011-08-10  1:48 ` Mimi Zohar
2011-08-10  7:21   ` James Morris
2011-08-12  2:47 Stephen Rothwell
2011-08-15  4:04 ` Stephen Rothwell

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).