Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp5498imu; Fri, 14 Dec 2018 12:28:32 -0800 (PST) X-Google-Smtp-Source: AFSGD/WOnMgSAqxASlrlM3PgT/GcYfnTS7YAtjj3hAvcg9lQzDotvM4jvS2ZvZkFIcHyFROtTMzx X-Received: by 2002:a65:6542:: with SMTP id a2mr3909588pgw.389.1544819312430; Fri, 14 Dec 2018 12:28:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544819312; cv=none; d=google.com; s=arc-20160816; b=kUtw6Q/Szn7XyqGuqlJAVewyXDQKsczdUKG5jPnlFE/l+YHpORDg6nJ30og8uaN76m psGVw6NhPYWYDTZ4n+ekhQMyM7BbgnE+o4yO62nkFsIQY6n6RAzHnSwn/lMGWCeKz/NC pMeMHPEnpRixOiuoRiArORxJy+D+oB65Xm/g82IRXgp7lMNfvNxVhJriiYMkr0l4SiVI EhFK3KR2SeuiX0fF6xgVEh9Qpe3nx8G5InlZXxbJKyq7g3JHGYi+WWiRIkwPq8oP8b9K zEqark0/5bKAD8QwTg+uIPU1ukzy2OTga9mX7u4h1EA5iGZJjbEHY757XiZegGA0tfjj um7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=HcRjHIJWEw0z2NroN4OMIPVF/fmqOACzJF60K0Cim74=; b=X9QLNGJ+Ht/vb0rKhuDrpB54AK1eCLxepH3NHgnUbxFV8Y7HqAASuByqmcRQvlGmNX IBW1SEMTz1gJWeP8sH0Bj2NnAk2/lT9kLkQtbZP7zrAjBfTANEYPHAsXEyxBcEORt5kP SALBb2EwyyAQbQ19tP/fMRLqd/n3LKkk6QQH639nTIuaHfinEk87e6OvN0lLIc6OpwDk 0Z488LMeG11OotvAiC27iSxOmQPhVSs2n+VHp0STo18i4Z32dRLKXPWNk8KmZ2FzsFH2 bK150VJcVSaPydgOR2IuFac0jWHERb/a2ZBHL5ue4GjZPivhLB5thvPLIEZq6zIQozZy k6Sg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k22si4508452pll.276.2018.12.14.12.28.17; Fri, 14 Dec 2018 12:28:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730747AbeLNU1V (ORCPT + 99 others); Fri, 14 Dec 2018 15:27:21 -0500 Received: from mail.windriver.com ([147.11.1.11]:56121 "EHLO mail.windriver.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730663AbeLNU1V (ORCPT ); Fri, 14 Dec 2018 15:27:21 -0500 Received: from ALA-HCA.corp.ad.wrs.com ([147.11.189.40]) by mail.windriver.com (8.15.2/8.15.1) with ESMTPS id wBEKQpDS027546 (version=TLSv1 cipher=AES128-SHA bits=128 verify=FAIL); Fri, 14 Dec 2018 12:26:51 -0800 (PST) Received: from yow-pgortmak-d1.corp.ad.wrs.com (128.224.56.57) by ALA-HCA.corp.ad.wrs.com (147.11.189.40) with Microsoft SMTP Server id 14.3.408.0; Fri, 14 Dec 2018 12:26:51 -0800 Received: by yow-pgortmak-d1.corp.ad.wrs.com (Postfix, from userid 1000) id D25572E0804; Fri, 14 Dec 2018 15:26:50 -0500 (EST) Date: Fri, 14 Dec 2018 15:26:50 -0500 From: Paul Gortmaker To: Mimi Zohar CC: Randy Dunlap , Stephen Rothwell , Linux Next Mailing List , Linux Kernel Mailing List , , James Morris Subject: Re: linux-next: Tree for Dec 14 (security/integrity/ima/) Message-ID: <20181214202650.GO11670@windriver.com> References: <20181214181826.5775b958@canb.auug.org.au> <8205aafb-bbc1-2196-17d9-e70e9ac56c2e@infradead.org> <1544815174.3681.16.camel@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1544815174.3681.16.camel@linux.ibm.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [Re: linux-next: Tree for Dec 14 (security/integrity/ima/)] On 14/12/2018 (Fri 14:19) Mimi Zohar wrote: > [Cc'ing Paul Gortmaker] > > On Fri, 2018-12-14 at 08:25 -0800, Randy Dunlap wrote: > > On 12/13/18 11:18 PM, Stephen Rothwell wrote: > > > Hi all, > > > > > > Changes since 20181213: > > > > > > > on i386: > > > > CC security/integrity/ima/ima_main.o > > ../security/integrity/ima/ima_main.c: In function 'ima_load_data': > > ../security/integrity/ima/ima_main.c:535:3: error: implicit declaration of function 'is_module_sig_enforced' [-Werror=implicit-function-declaration] > > sig_enforce = is_module_sig_enforced(); > > ^ > > > > > > Needs: > > Commit 4f83d5ea643a ("security: integrity: make ima_main explicitly > non-modular") just removed module.h. Yes, unfortunately the security directory has additional confusion because there is name space overlap between "module" as used in Linux Security Module, and "module" as in "insmod foo.ko". The ima_main is not modular, but it does use modular infrastructure to load others. Fortunately this was the final commit in the series, so it can be removed or reverted as per maintainer's choice. In the meantime, I'll look into why my "allyesconfig" build testing didn't pick up on this, so I can close that testing gap. Randy, if you were using one of your usual "randconfig" builds, maybe you can mail me the .config out of band - no need spamming the lists. Thanks, and sorry for the undetected fallout. Paul. -- > > Mimi? > > > > > > --- > > security/integrity/ima/ima_main.c | 1 + > > 1 file changed, 1 insertion(+) > > > > --- linux-next-20181214.orig/security/integrity/ima/ima_main.c > > +++ linux-next-20181214/security/integrity/ima/ima_main.c > > @@ -24,6 +24,7 @@ > > #include > > #include > > #include > > +#include > > #include > > #include > > #include > > > > > > >