From nobody Thu May 2 07:58:14 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=reject dis=none) header.from=citrix.com ARC-Seal: i=1; a=rsa-sha256; t=1626279848; cv=none; d=zohomail.com; s=zohoarc; b=DLSnUyiUasWZs2f//xHZJ7PmJIheIupvkNYz+v7SAAvqBbCmRAPrqqfK6Xdh9mXKZ/6LNCl/F/I87S9S7D6s7cyvAMEAoiE3osYq1GbxKNlJnqUHGv6T/hXz0S3yM/y+mcGXo6BBikfjJAo2bdDwTcJq1OVvZaCof3hvUG8Ndes= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1626279848; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To; bh=ZKVcKYm3A5V9kgFMFMcO/tR8sZ5kPQphtUYxuM/WZV0=; b=HHDWHLaCTgV43BQU5WgFlBJV6WMErjquCpafHcV0B67d2TAtHzP73FxcwVAHNnwlrxAYuEUQFj1rNSWh6Cafw2rAgZka9mGN8ClxSf1lsei57zX58UPIFWi/JcMZezVSUg7sP2PmvvarrxW/aTk2sIF1cqSDW4ZI2py83R3ayGs= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=reject dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1626279847982789.0972152425313; Wed, 14 Jul 2021 09:24:07 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.156109.288054 (Exim 4.92) (envelope-from ) id 1m3hfl-0006ps-Pm; Wed, 14 Jul 2021 16:23:45 +0000 Received: by outflank-mailman (output) from mailman id 156109.288054; Wed, 14 Jul 2021 16:23:45 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1m3hfl-0006pl-MA; Wed, 14 Jul 2021 16:23:45 +0000 Received: by outflank-mailman (input) for mailman id 156109; Wed, 14 Jul 2021 16:23:44 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1m3hfk-0006pd-8Y for xen-devel@lists.xenproject.org; Wed, 14 Jul 2021 16:23:44 +0000 Received: from esa1.hc3370-68.iphmx.com (unknown [216.71.145.142]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id f3de6a9d-c5bd-4392-824d-31e780256793; Wed, 14 Jul 2021 16:23:43 +0000 (UTC) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: f3de6a9d-c5bd-4392-824d-31e780256793 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1626279822; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=+oIamF65xOJYpqm9F/0U7SPwc0rb7tTmwQOWYZ4yTRk=; b=ZlaM9TYWNr0pu68A2KapMVLrZBM/TVRy4rhvv9TTYJrZ3y0o+RUwIpBP iOXcANF3T4u1ipCd8nsaB4QNAxzEfbYxdQEEV6PkPhemcBQXc+NPByP4W yMRzAwUwe0+p0pJC1+6oA1kggX+A7Ct3YiPpjNWFGbYri4bbIsHfc73lm 8=; Authentication-Results: esa1.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none IronPort-SDR: nzDWEIqEia5qkWyJaarIh+nToFrTzhY5WJHPYOawEI5b8udIxJ/IVYjmpnzLxStjoQ80UYv98S UlgJKh3EKCqTSktwOaoMFUb4C40uxoDBmIHI+PsQ/4mI3IXe9TTslLDiMREgw3xEXj6gCe21dJ 4wzyg2mGZyILosnQaZtb77myRNibyZNfpoIvU03WZ54uLnfQSyBP6dPKsoi89hBqkUmc7ynhoY 5XUY1sK9IArkDSDc4GseAbaS+y3hiVnUgxVX7uhrUJFc+uROQ+pQ2PFhrg4SovdNWI02NBtwse Wz0= X-SBRS: 5.1 X-MesageID: 48656805 X-Ironport-Server: esa1.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED IronPort-HdrOrdr: A9a23:I4PKu6uVbR7gxmjEVuyCXE507skDetV00zEX/kB9WHVpmszxra 6TdZMgpHvJYVcqKRcdcL+7WJVoLUmxyXcX2/h1AV7BZniEhILAFugLhuGO/9SJIVyYygc378 ZdmsZFZ+EYdWIK7/rH3A== X-IronPort-AV: E=Sophos;i="5.84,239,1620705600"; d="scan'208";a="48656805" From: Anthony PERARD To: CC: Anthony PERARD , Andrew Cooper , George Dunlap , "Ian Jackson" , Jan Beulich , Julien Grall , Stefano Stabellini , Wei Liu Subject: [XEN PATCH] xen: allow XSM_FLASK_POLICY only if checkpolicy binary is available Date: Wed, 14 Jul 2021 17:17:34 +0100 Message-ID: <20210714161734.256246-1-anthony.perard@citrix.com> X-Mailer: git-send-email 2.32.0 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @citrix.com) X-ZM-MESSAGEID: 1626279850017100001 Content-Type: text/plain; charset="utf-8" This will help prevent the CI loop from having build failures when `checkpolicy` isn't available, when doing "randconfig" jobs. Signed-off-by: Anthony PERARD Acked-by: Andrew Cooper Reviewed-by: Jason Andryuk --- Config.mk | 6 ------ xen/Makefile | 2 ++ xen/common/Kconfig | 7 +++++-- 3 files changed, 7 insertions(+), 8 deletions(-) diff --git a/Config.mk b/Config.mk index d08fa8d60dd7..97d3633706b3 100644 --- a/Config.mk +++ b/Config.mk @@ -137,12 +137,6 @@ export XEN_HAS_BUILD_ID=3Dy build_id_linker :=3D --build-id=3Dsha1 endif =20 -ifndef XEN_HAS_CHECKPOLICY - CHECKPOLICY ?=3D checkpolicy - XEN_HAS_CHECKPOLICY :=3D $(shell $(CHECKPOLICY) -h 2>&1 | grep -q xen = && echo y || echo n) - export XEN_HAS_CHECKPOLICY -endif - define buildmakevars2shellvars export PREFIX=3D"$(prefix)"; = \ export XEN_SCRIPT_DIR=3D"$(XEN_SCRIPT_DIR)"; = \ diff --git a/xen/Makefile b/xen/Makefile index 8023680ffbf2..a60e49903d0c 100644 --- a/xen/Makefile +++ b/xen/Makefile @@ -17,6 +17,8 @@ export XEN_BUILD_HOST ?=3D $(shell hostname) PYTHON_INTERPRETER :=3D $(word 1,$(shell which python3 python python2 2>/d= ev/null) python) export PYTHON ?=3D $(PYTHON_INTERPRETER) =20 +export CHECKPOLICY ?=3D checkpolicy + export BASEDIR :=3D $(CURDIR) export XEN_ROOT :=3D $(BASEDIR)/.. =20 diff --git a/xen/common/Kconfig b/xen/common/Kconfig index 0ddd18e11af3..13537e460b8f 100644 --- a/xen/common/Kconfig +++ b/xen/common/Kconfig @@ -25,6 +25,9 @@ config GRANT_TABLE config HAS_ALTERNATIVE bool =20 +config HAS_CHECKPOLICY + def_bool $(success,$(CHECKPOLICY) -h 2>&1 | grep -q xen) + config HAS_COMPAT bool =20 @@ -235,8 +238,8 @@ config XSM_FLASK_AVC_STATS =20 config XSM_FLASK_POLICY bool "Compile Xen with a built-in FLASK security policy" - default y if "$(XEN_HAS_CHECKPOLICY)" =3D "y" - depends on XSM_FLASK + default y + depends on XSM_FLASK && HAS_CHECKPOLICY ---help--- This includes a default XSM policy in the hypervisor so that the bootloader does not need to load a policy to get sane behavior from an --=20 Anthony PERARD