Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1628923pxb; Thu, 4 Mar 2021 16:55:18 -0800 (PST) X-Google-Smtp-Source: ABdhPJwexW58PDC68+QKyD9qIJlDBy2CnHb5s8c2aNwtmAk1aPX7GBIy3E3mqVy44mE93rHoAra7 X-Received: by 2002:a92:c690:: with SMTP id o16mr6595073ilg.256.1614905718122; Thu, 04 Mar 2021 16:55:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614905718; cv=none; d=google.com; s=arc-20160816; b=uCxsFABFNUk6P43vnt86ilHhrn7NdZQILMosxXg7GfjHc1JS7CSSrasn9lNPicO7HT DG+UkPBcukJBBXG1+l7/mRyT6pYRA6bbYmHQUgoxy42TkzqKmdTQsoAP1WY6iJ/1fsuf waaDhfRw5WT6xQBSB9I51zPb5ouDCDpTwfon8+qtSBilSNsj7vAkrWvgHgatoebcCd/3 gkOwPrmVdCWtvRbgr0JI4jCZkEuDHEAn1cnFFuZfanq2EhI50rge7QGOvqLWPjA3tMDT DoiqXtaru2kuUhF1VMl39jbOz9crH56LGlsAXJ+aeV2F6j39UcUSVGyVh8jeoMaYjWSr sr7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=0kIkWa1ksKR8lOY2V//QTHTahUzq9b7L+r3JXFxE4+4=; b=HWunCmygszPmxRL4aVQUAzkT8d4nmXJGC/rxUFJuVBKxje2SdzYguboXxHd4xD65C2 3XicayFIJu8FVrJ5dASurut4m8jMMNnAWdGMBZjsUejtZv3/kRdFEx2Tn8YQ0yRgDGD2 UTsDyuK9RySEVZuQVBcZjkFCwg2OzQjZI8j+8eMdgTS+tJHDezt5pQ1sGd/kMKH6jAuk FIz42A66OpVFGM+tEntCWyDjzsnvRwH74p+T9BMmwb3j+w5umpTIPQs1aTpYuJDh9sWa LsyBmxm9dlmj4fwqkZLTcc4vB08nzS4DRCz51G5Y6uXmMPx62UydUI8IPWEfMihdsEn+ iN8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=htMV+HCX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e11si862191iod.98.2021.03.04.16.55.04; Thu, 04 Mar 2021 16:55:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=htMV+HCX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233357AbhCDSL4 (ORCPT + 99 others); Thu, 4 Mar 2021 13:11:56 -0500 Received: from mail.kernel.org ([198.145.29.99]:53824 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232910AbhCDSLe (ORCPT ); Thu, 4 Mar 2021 13:11:34 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id D0F77601FC; Thu, 4 Mar 2021 18:10:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1614881454; bh=94nUPAIo/SOVZwYfOOqkmiIoMu5B812AS/7+fs0wD+A=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=htMV+HCXvUU5tZ2Vd6Bjd6nP9WiCd9wzRjH9Bn5xkhobQyupqV6cN3VrAsj5y3aeb fvhEVUp4Ujkfc7GwAxRAGzoOslTJuMH1hAGfydF4rzqhYdRaJAFMUxguM70W5ahjmA RWeox10asVFkKmTcIHHrSz2dNzEzzYMTJr8qHysiDzeVrKiW7O/37hsvZvzq5E4GWW fTo+wKIFM5oz54M9P2gYMOBHGxcYS7ejq6Wzg7L3xuhlicEqSsCBVZL+HOqa/Kqki8 kC0kLNfr8Fp7ksVVhI5Rs0ioOsLRCKkLwHoQ6FdUH2U9lbrRCvBSbe9KhMxTeVxkgc nYmlhpn8eLuBw== Date: Thu, 4 Mar 2021 11:10:49 -0700 From: Nathan Chancellor To: Eric Snowberg Cc: rdunlap@infradead.org, dhowells@redhat.com, jarkko@kernel.org, dwmw2@infradead.org, keyrings@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] certs: Fix wrong kconfig option used for x509_revocation_list Message-ID: <20210304181049.nv5vnm3uj2w7zsqt@archlinux-ax161> References: <20210304175030.184131-1-eric.snowberg@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210304175030.184131-1-eric.snowberg@oracle.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Mar 04, 2021 at 12:50:30PM -0500, Eric Snowberg wrote: > Fix a build issue when x509_revocation_list is not defined. > > $ make ARCH=x86_64 O=build64 all > > EXTRACT_CERTS ../ > At main.c:154: > - SSL error:0909006C:PEM routines:get_name:no start line: crypto/pem/pem_lib.c:745 > extract-cert: ../: Is a directory > make[2]: [../certs/Makefile:119: certs/x509_revocation_list] Error 1 (ignored) > > When the new CONFIG_SYSTEM_REVOCATION_LIST was added [1], it was not carried > into the code for preloading the revocation certificates [2]. Change from > using the original CONFIG_SYSTEM_BLACKLIST_KEYRING to the new > CONFIG_SYSTEM_REVOCATION_LIST. > > [1] https://lore.kernel.org/keyrings/EDA280F9-F72D-4181-93C7-CDBE95976FF7@oracle.com/T/#m562c1b27bf402190e7bb573ad20eff5b6310d08f > [2] https://lore.kernel.org/keyrings/EDA280F9-F72D-4181-93C7-CDBE95976FF7@oracle.com/T/#m07e258bf019ccbac23820fad5192ceffa74fc6ab > > Reported-by: Randy Dunlap > Signed-off-by: Eric Snowberg This seems to fix my build errors. Tested-by: Nathan Chancellor > --- > v2 changes: > Use the new config option for extract-cert > Use the new config option when building revocation_certificates.o > --- > certs/Makefile | 5 +++-- > certs/blacklist.c | 4 ++++ > scripts/Makefile | 2 +- > 3 files changed, 8 insertions(+), 3 deletions(-) > > diff --git a/certs/Makefile b/certs/Makefile > index e3f4926fd21e..b6db52ebf0be 100644 > --- a/certs/Makefile > +++ b/certs/Makefile > @@ -4,7 +4,8 @@ > # > > obj-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += system_keyring.o system_certificates.o common.o > -obj-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += blacklist.o revocation_certificates.o common.o > +obj-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += blacklist.o common.o > +obj-$(CONFIG_SYSTEM_REVOCATION_LIST) += revocation_certificates.o > ifneq ($(CONFIG_SYSTEM_BLACKLIST_HASH_LIST),"") > obj-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += blacklist_hashes.o > else > @@ -105,7 +106,7 @@ $(obj)/signing_key.x509: scripts/extract-cert $(X509_DEP) FORCE > $(call if_changed,extract_certs,$(MODULE_SIG_KEY_SRCPREFIX)$(CONFIG_MODULE_SIG_KEY)) > endif # CONFIG_MODULE_SIG > > -ifeq ($(CONFIG_SYSTEM_BLACKLIST_KEYRING),y) > +ifeq ($(CONFIG_SYSTEM_REVOCATION_LIST),y) > > $(eval $(call config_filename,SYSTEM_REVOCATION_KEYS)) > > diff --git a/certs/blacklist.c b/certs/blacklist.c > index 723b19c96256..c9a435b15af4 100644 > --- a/certs/blacklist.c > +++ b/certs/blacklist.c > @@ -21,8 +21,10 @@ > > static struct key *blacklist_keyring; > > +#ifdef CONFIG_SYSTEM_REVOCATION_LIST > extern __initconst const u8 revocation_certificate_list[]; > extern __initconst const unsigned long revocation_certificate_list_size; > +#endif > > /* > * The description must be a type prefix, a colon and then an even number of > @@ -225,6 +227,7 @@ static int __init blacklist_init(void) > */ > device_initcall(blacklist_init); > > +#ifdef CONFIG_SYSTEM_REVOCATION_LIST > /* > * Load the compiled-in list of revocation X.509 certificates. > */ > @@ -237,3 +240,4 @@ static __init int load_revocation_certificate_list(void) > blacklist_keyring); > } > late_initcall(load_revocation_certificate_list); > +#endif > diff --git a/scripts/Makefile b/scripts/Makefile > index 983b785f13cb..bd0718f7c493 100644 > --- a/scripts/Makefile > +++ b/scripts/Makefile > @@ -11,7 +11,7 @@ hostprogs-always-$(CONFIG_ASN1) += asn1_compiler > hostprogs-always-$(CONFIG_MODULE_SIG_FORMAT) += sign-file > hostprogs-always-$(CONFIG_SYSTEM_TRUSTED_KEYRING) += extract-cert > hostprogs-always-$(CONFIG_SYSTEM_EXTRA_CERTIFICATE) += insert-sys-cert > - hostprogs-always-$(CONFIG_SYSTEM_BLACKLIST_KEYRING) += extract-cert > +hostprogs-always-$(CONFIG_SYSTEM_REVOCATION_LIST) += extract-cert > > HOSTCFLAGS_sorttable.o = -I$(srctree)/tools/include > HOSTCFLAGS_asn1_compiler.o = -I$(srctree)/include > -- > 2.18.4 >