Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1258313imm; Wed, 15 Aug 2018 14:21:38 -0700 (PDT) X-Google-Smtp-Source: AA+uWPx1foFc11ZY/TfEMV5FdGu/dlbihfpyYxdItlgyhuBQlo8oegPvULlWEDlfR6QOvP80i6tJ X-Received: by 2002:a63:455c:: with SMTP id u28-v6mr26672435pgk.210.1534368098458; Wed, 15 Aug 2018 14:21:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1534368098; cv=none; d=google.com; s=arc-20160816; b=mFeVSUS5hFKLO28owYZdpVTVN1rRxcBVhpsjePAdXrjw9KRL+jNXcYxvifVTbUN812 x7+RS33PqtWHKueb5F44uyStOZFouX1xYfQZDd0UF16KtHoDFA3ICHGeRA/JG/IPdDEn HNKwz1EJ1w9vurBvF1YN8UnuqW/ywObDPINc0JNKv2H0ryAdHrGsi/8aYaP2ihmjWLDo FUScSHe1C1W9L1FDYzA1UsS96WVDBqaj7E4PGaW7qhL/N4vi4kWJeNjvuYeMqHYZqqhj A/duPgk0r0uzqEKiEtQWwpYhYK3urSL633XkYdzUGeJq87nAIehXH94XtX94JAQxFHrc 3x7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:autocrypt:openpgp:from:references:cc:to:subject :arc-authentication-results; bh=FSi3bf/sesog063m+jziYaYsdHwss36HKHPmPSvMm+0=; b=kedqt2Hjf3BwnOC4t8/Jdb0BNrHrlcumKB95l/9JchOvP1fn7XgrKbYkB7CG4uvwHz 3K+w/qrU+aKRcIub5E6waY1dwJ5FrFiExkmb6NufZ49bCiK8j60rgFEAC35VqAv//yWS ScppJqkt3ox+ARCVF+wqfUkWAXKuwWq4kMyYMMHkOyiNHbE+SwDfA9Kqc0GlnVVTzWEP iRLdgZE9lH0ssz5Tau8ZECiyEASx8PXIS8B0K1CZPP/w4NFaOSb44LP+jgryDczla0H0 GVUmR82BkJJrTUCIZ0VB1tCQ1Mq3qMO5KsyUcR6xJ1zFp0tcFYz9cu1/hAmqvBakkkxz dNDw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c197-v6si26695680pfc.74.2018.08.15.14.21.23; Wed, 15 Aug 2018 14:21:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727709AbeHPANt (ORCPT + 99 others); Wed, 15 Aug 2018 20:13:49 -0400 Received: from mail.sembritzki.me ([5.45.101.249]:60736 "EHLO mail.sembritzki.me" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727412AbeHPANt (ORCPT ); Wed, 15 Aug 2018 20:13:49 -0400 Received: from [192.168.1.22] (x55b336e5.dyn.telefonica.de [85.179.54.229]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.sembritzki.me (Postfix) with ESMTPSA id 88D2BA7AA1; Wed, 15 Aug 2018 23:19:51 +0200 (CEST) Subject: Re: [PATCH 2/2] [FIXED] Replace magic for trusting the secondary keyring with #define To: kbuild test robot Cc: kbuild-all@01.org, Linus Torvalds , David Howells , Thomas Gleixner , Ingo Molnar , Peter Anvin , the arch/x86 maintainers , Linux Kernel Mailing List , Dave Young , Baoquan He , "Justin M. Forbes" , Peter Jones , James Bottomley , Matthew Garrett , Vivek Goyal References: <20180815194244.29564-3-yannik@sembritzki.me> <201808160443.5h16PxVs%fengguang.wu@intel.com> From: Yannik Sembritzki Openpgp: preference=signencrypt Autocrypt: addr=yannik@sembritzki.me; prefer-encrypt=mutual; keydata= xsFNBFLQZToBEADD7mghnzDjt9mG5rD4QG1vNuqbSnqkr9j8ONNdAnSP5fAYHDWqVVGWMxJF Sc7qu5Z1GUd5l0jvd+pM9oWoIFkcr6a9ZjsYZLTe+YN612KLSpqdEbssKQlembHFzX8qOzr5 bta/g5VtZmzf22HynDwNF8hfIzrfdE0PZUCEtIfwE7aeg8JBb0yHz2Gknd90s3DRcx9Ba4Zl GmB4hYqzpNQedZU0W8Tp/ISI2osQIc81qxur4XF23jfYVOygE3pxkAMB5y0goATeGE5JSCll 6i7XXHN/Qbh7+8u/ZFbNTVONy3VrA+/1AXx41zDUrbc7v11F/+vN5vZcDjlFXc8cR1kwPV5P xGTtdDfJ6Ko0lN+8xoe3CLhnzQRPtZAvulKxiVknILl6l8yI8zwKXJxqzcg/d34PQMs1UxYY 2FW0j+tXSUHRpGUFpBUO44tLUWdTz3+lscEAYnnHSFpl9N5ExaUtfO+P7uIoY56lhd/zkuSw zudsv5qNMHLTH9k4gM9Gofp0jXGRc4Swumt/hF3BzmvvwMASci4kkFVgk4sxLlp+xzj51Oc+ WFIRSRkcx6xyWZKWeFcaPGd6+E0IR+7hkL2lQPta8+ypnn8AhYH2h17OiXOjs4ACLkZdoA+j JiPv6r+kWdLw3NNKDrdWewVfscSRooAZqm4+45u8VnbMuqgxfwARAQABzShZYW5uaWsgU2Vt YnJpdHpraSA8eWFubmlrQHNlbWJyaXR6a2kubWU+wsGWBBMBAgBAAhsjBwsJCAcDAgEGFQgC CQoLBBYCAwECHgECF4AWIQRni0pjVV8jkbaA6/4plgq9sKUg5QUCWgjAyQUJCRmPDwAKCRAp lgq9sKUg5RzMEACw1nDkJ2tM/VP0TWmcCD243CyqyxMA50M2JDhoh+Vlnwev7VBX+/mr9AgP EQKjDha3/cXXvWm5ve/LDJ+SjmijGuUsCLhuiymOxfFXZ3F9f6f8/kwgXhmcVHE91iY+ikAa G+di05rrHjQVKPNGTApVjsXyY4RC53mSZcu1MSQkq34zhZdYHAnQOHD5k4D3AINgQKQ4BIY1 AEnAWXuxOFITF2F2BWDm8GyQaF1Z9kDgyQUairXl6fyM5xnUC/rIeT52Cj5Q7S3czFwYX9dg QK+3yg45aZOapc+MOEDIlwEyHBv2vTLGb4EcbtD4iKB9yhbIjt9c9aFKcCDS/bTWT0HA23CF irM9zPOP+217XK3aXfsQ+nTOkWaLtSvakmSg4Pg+tLitd89cSMWM69DjecT30h7aNtUKZljR G+gShD/2oz9gUQkLOAmSqhhOwebHnux4WhLhFaWGOI71+6yUkqQ3+RCl9VTxDZ7Fta7lgrBv K30sNA9xsWEzgFCOj6/sxBRLPg35PpKGAqCRkDsbJviq/C4FBAKdJVZx6+yR2B7WA7WdYkZo OvvxitOAh5AuR9yjk5g2iv99umVpfA3giNiKo1peaqIsEXWjEr5GJciGTRrK79NXkWrW0dLr vertgg9/6yu2Fu9ufqhAdXhWD1lvGnpkb1gGGJCBXi2vn0zUec7BTQRS0GU6ARAAtN27We2e 01W1AsFolLDJOVcmze9AT2KWYn9RmvKHMQjfx4TH8i2U63jBRjWU4imlC+rmFHyeV4S4DVEf IV4xztsc8bsVuwtvyL8oTiUcXvJaeHgk5zyExorDeHE3ho7VJHmrxGSM6am9jD1Hprl9hJJ3 8JISlAG8kSm/0vRpJulv4MbKNYldRlqPjklcLnn3VUtR+mQKFWlEVrIBxwjv2mV9u34w0n37 DuuvkeEXp0et2gm9kwiWWFb/MaTx7uagJCEiZKABSZyHaDNqNohs9zNva4BxTemC9liXkpWV JTLsGD8Fls2GsxMzeUTUOLjWQmaWTFnXGl9uso+xZfyLUdI/bCk5TowSbwdl2LgbMWPQ6dHC uT62gNJyzYZispENGJVrclts5NfTZtxbYPFqtq7Zg65R8DiR/97kErA9+RKa6eJxIDGrZl0L 1ZUsvKMtqZmr32Uilma89rvzK6Xb2LEg3sdvIU1k6XBotVQwVpUEnEyW7zDj3yR6lybCOCZC NWz7ydfD8yYcVcpaUFpe9fGR9/ogu7guXPDEB9oVmkPA4UzXT8djV01+4bn2wCq2qrDwihpc Z+wE1CjGdlcyTPKIWqTVKZBeOJZ6QQdQ4Mf/EFGtk+Al8k/V9Wf8jskaScpoq2to9OUxXi3x ednXTOffXTn/jHBeFrAgHIHzxl0AEQEAAcLBfAQYAQIAJgIbDBYhBGeLSmNVXyORtoDr/imW Cr2wpSDlBQJaCMDMBQkJGY8SAAoJECmWCr2wpSDltkcQALvt01s8+bWJky9vK+Bforkjo9kN xlx+P4iYQ4O1GC3l7beZgBn6XCHXgv4fxPjY8bcTBamD9EKPgd3L2qMneAuR8quBlT1+/7Ys PiNmWjDSGjk9pJ+civRLwmrrEfOS2h5vBK87afuXxVriwpKxTRn//vzfsCT7E0W5BcmlvjT1 rMdPaESGKURSlhmMHN/+UfMpEzBdz2Xk52F5FL8vAX3aL4hCpw0VANq07ZujTFD9wsQ1KbOu kTGWoS2HPZy4Fkna9LWyvq6Hsi2oOV2sdMthpDlp6n+sWzJAQbgVde+BGGyzOzPYcm1a4Yo5 XAbVTkBmRHlLDM0ODi+aL/T4ecgPRfWiKt+iwiph7SvvQVVeB60JV6y48+VHnM6y0jHr70rz 4EP3uVthtKTeAs4jrPrayXVOuDfFp9m8WsefoXy/llWe9F/2PPXAQbrNeLPQxyhCkNpmbqCd pz34mj88o+7V4BsiU+q6nqs9bsU/9Oc6d6fsaXpzMUMXKJxKndlSAnyjbdsw+WLYlT1VrmMK QM0ulk0PSn8u1L2TNLx+3nhY+IfGuWZqD7xXmI7ujh0UrqwIjMDd7+Ewfr2RdTrvtuSq5BYb U8vMWqT95t3jNocATQaWbKgHK9udONAFx1CZrLdHQFtEnrz+1illZG7oHaZyQBotCDrgu8QN YfNfIPB+ Message-ID: <1bfa03ed-c9f8-d0f2-700c-c93e96d5b99c@sembritzki.me> Date: Wed, 15 Aug 2018 23:19:51 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <201808160443.5h16PxVs%fengguang.wu@intel.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 8bit Content-Language: de-DE Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Signed-off-by: Yannik Sembritzki --- ?arch/x86/kernel/kexec-bzimage64.c?????? | 2 +- ?certs/system_keyring.c????????????????? | 3 ++- ?crypto/asymmetric_keys/pkcs7_key_type.c | 2 +- ?include/linux/verification.h??????????? | 5 +++++ ?4 files changed, 9 insertions(+), 3 deletions(-) diff --git a/arch/x86/kernel/kexec-bzimage64.c b/arch/x86/kernel/kexec-bzimage64.c index 74628275..97d199a3 100644 --- a/arch/x86/kernel/kexec-bzimage64.c +++ b/arch/x86/kernel/kexec-bzimage64.c @@ -532,7 +532,7 @@ static int bzImage64_cleanup(void *loader_data) ?static int bzImage64_verify_sig(const char *kernel, unsigned long kernel_len) ?{ ???? return verify_pefile_signature(kernel, kernel_len, -??? ??? ??? ??? ?????? ((struct key *)1UL), +??? ??? ??? ??? ?????? TRUST_SECONDARY_KEYRING, ???? ??? ??? ??? ?????? VERIFYING_KEXEC_PE_SIGNATURE); ?} ?#endif diff --git a/certs/system_keyring.c b/certs/system_keyring.c index 6251d1b2..777ac7d2 100644 --- a/certs/system_keyring.c +++ b/certs/system_keyring.c @@ -15,6 +15,7 @@ ?#include ?#include ?#include +#include ?#include ?#include ?#include @@ -230,7 +231,7 @@ int verify_pkcs7_signature(const void *data, size_t len, ? ???? if (!trusted_keys) { ???? ??? trusted_keys = builtin_trusted_keys; -??? } else if (trusted_keys == (void *)1UL) { +??? } else if (trusted_keys == TRUST_SECONDARY_KEYRING) { ?#ifdef CONFIG_SECONDARY_TRUSTED_KEYRING ???? ??? trusted_keys = secondary_trusted_keys; ?#else diff --git a/crypto/asymmetric_keys/pkcs7_key_type.c b/crypto/asymmetric_keys/pkcs7_key_type.c index e284d9cb..0783e555 100644 --- a/crypto/asymmetric_keys/pkcs7_key_type.c +++ b/crypto/asymmetric_keys/pkcs7_key_type.c @@ -63,7 +63,7 @@ static int pkcs7_preparse(struct key_preparsed_payload *prep) ? ???? return verify_pkcs7_signature(NULL, 0, ???? ??? ??? ??? ????? prep->data, prep->datalen, -??? ??? ??? ??? ????? (void *)1UL, usage, +??? ??? ??? ??? ????? TRUST_SECONDARY_KEYRING, usage, ???? ??? ??? ??? ????? pkcs7_view_content, prep); ?} ? diff --git a/include/linux/verification.h b/include/linux/verification.h index a10549a6..ad221ab2 100644 --- a/include/linux/verification.h +++ b/include/linux/verification.h @@ -12,6 +12,11 @@ ?#ifndef _LINUX_VERIFICATION_H ?#define _LINUX_VERIFICATION_H ? +// Allow both builtin trusted keys and secondary trusted keys +#ifndef TRUST_SECONDARY_KEYRING +#define TRUST_SECONDARY_KEYRING ((struct key *)1UL) +#endif + ?/* ? * The use to which an asymmetric key is being put. ? */ -- 2.17.1 Sorry, I've fixed this now. On 15.08.2018 23:14, kbuild test robot wrote: > Hi Yannik, > > Thank you for the patch! Yet something to improve: > > [auto build test ERROR on linus/master] > [also build test ERROR on v4.18 next-20180814] > [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] > > url: https://github.com/0day-ci/linux/commits/Yannik-Sembritzki/Fix-kexec-forbidding-kernels-signed-with-keys-in-the-secondary-keyring-to-boot/20180816-042529 > config: x86_64-randconfig-x019-201832 (attached as .config) > compiler: gcc-7 (Debian 7.3.0-16) 7.3.0 > reproduce: > # save the attached .config to linux build tree > make ARCH=x86_64 > > All errors (new ones prefixed by >>): > > In file included from include/keys/asymmetric-type.h:18:0, > from crypto/asymmetric_keys/asymmetric_keys.h:12, > from crypto/asymmetric_keys/restrict.c:17: >>> include/linux/verification.h:12:0: error: unterminated #ifndef > #ifndef _LINUX_VERIFICATION_H > > -- > In file included from include/crypto/pkcs7.h:15:0, > from crypto/asymmetric_keys/pkcs7_parser.h:13, > from crypto/asymmetric_keys/pkcs7_parser.c:20: >>> include/linux/verification.h:12:0: error: unterminated #ifndef > #ifndef _LINUX_VERIFICATION_H > > In file included from include/keys/asymmetric-type.h:18:0, > from crypto/asymmetric_keys/x509_parser.h:14, > from crypto/asymmetric_keys/pkcs7_parser.h:14, > from crypto/asymmetric_keys/pkcs7_parser.c:20: >>> include/linux/verification.h:12:0: error: unterminated #ifndef > #ifndef _LINUX_VERIFICATION_H > > > vim +12 include/linux/verification.h > > e68503bd David Howells 2016-04-06 @12 #ifndef _LINUX_VERIFICATION_H > e68503bd David Howells 2016-04-06 13 #define _LINUX_VERIFICATION_H > e68503bd David Howells 2016-04-06 14 > > :::::: The code at line 12 was first introduced by commit > :::::: e68503bd6836ba765dc8e0ee77ea675fedc07e41 KEYS: Generalise system_verify_data() to provide access to internal content > > :::::: TO: David Howells > :::::: CC: David Howells > > --- > 0-DAY kernel test infrastructure Open Source Technology Center > https://lists.01.org/pipermail/kbuild-all Intel Corporation