Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3068232imu; Mon, 17 Dec 2018 12:43:16 -0800 (PST) X-Google-Smtp-Source: AFSGD/V/sHU3ONi2CuNW+Qjr+Y06xh7bO5j0w3KOBoiIdL5DY0WDyy1frDaMOYQCVjCx6WS5GMxq X-Received: by 2002:a62:cd44:: with SMTP id o65mr14047253pfg.222.1545079396511; Mon, 17 Dec 2018 12:43:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545079396; cv=none; d=google.com; s=arc-20160816; b=felHrlL8Fhh91d+yA+d6Dm3SIQh4BesSMC0H4QBt9sDFc5WJbJgXR5fp8NtLUKsQgD zh0e5yU4/c048SqsJNONG3wNlizjczow7dwiL1TJkzcjfzJbbxYi826ymTN1gi92ERS1 R032TeYX/VG1ErCF22QJZNcT0KTb6Oe58VMz18siuUNj/Xo0bcQ6KRiawC2hoeK1FCpl 3ng+Nz2xzyESaKxmQHkwUho5rvZZiOc6A5Pq8gLNHjqYHv3ovZcLa6AHV8hbupls6xie nWFiyerVPAtQzTT/aKc887tQH9sY1F+gcxE/jqvV5k5hSZ8iRcIrzitzEt7FJjWc1nTW g1xA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :dkim-signature; bh=oFqrjb+uOnZTvxnFZdknmmrkjvNFJHpIaLiTcr4fu8Y=; b=QmCpkxD0UfKeItObhobOvzgiMp8GYbGMOjJ1c7bFTrrLCajtzoqdu4L6I+dJ51Ib33 yGm6huXNHFPY+Y7mewZiypbWwKbZkEtmzRNqmRDcqpb0p1a3UeANNR+P6UxTeLxwiCXF za4GpbQ8B6kyVoEjt5bpNoZ7sIwdU8T1AS05wF1S02P968xbTSE1NwNDntGT8wPVGm5f q3tvulOWqUx2QRhnu+n7wuz8uSlifGfuuvREkbiV0nD/GLroOHwicE9+kcDyR3eQhV9E QxfFxH9gOnvs1YqrL1AbcGGBk33fXPMKs302yRDPf4J3Q6aIRLHCgoWbyU3RhVW5QnCL Kn+Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=vrgs7plJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w190si11572126pgd.338.2018.12.17.12.43.01; Mon, 17 Dec 2018 12:43:16 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@hansenpartnership.com header.s=20151216 header.b=vrgs7plJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388315AbeLQTvD (ORCPT + 99 others); Mon, 17 Dec 2018 14:51:03 -0500 Received: from bedivere.hansenpartnership.com ([66.63.167.143]:59466 "EHLO bedivere.hansenpartnership.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726753AbeLQTvD (ORCPT ); Mon, 17 Dec 2018 14:51:03 -0500 Received: from localhost (localhost [127.0.0.1]) by bedivere.hansenpartnership.com (Postfix) with ESMTP id 4F6638EE1CB; Mon, 17 Dec 2018 11:51:02 -0800 (PST) Received: from bedivere.hansenpartnership.com ([127.0.0.1]) by localhost (bedivere.hansenpartnership.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sErl1WIs9q2o; Mon, 17 Dec 2018 11:51:02 -0800 (PST) Received: from [153.66.254.194] (unknown [50.35.68.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bedivere.hansenpartnership.com (Postfix) with ESMTPSA id 95B018EE0A4; Mon, 17 Dec 2018 11:51:01 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=hansenpartnership.com; s=20151216; t=1545076262; bh=rbySyw3boEay55iMh/GbYF6swfAoUMJlbxA/55um2TI=; h=Subject:From:To:Cc:Date:In-Reply-To:References:From; b=vrgs7plJ0OGRACpVETeumGyQZndoFvPcMRM2UnH6HxO1l/qnXCGrJyVJlGUX8bEKR bkH/yvZy4Gt6cNCjugXmblwpXYHn+7SsMKvausj9WRvzUnB1f6kaeK6DinFKugyaQO ft8nuNttpte1qWyZ3eZ6g1LvfW8cVA4zOgiZgqg8= Message-ID: <1545076260.2878.15.camel@HansenPartnership.com> Subject: Re: [PATCH RESEND] KEYS: fix parsing invalid pkey info string From: James Bottomley To: Linus Torvalds , ebiggers@kernel.org, James Morris James Morris , Mimi Zohar , Jarkko Sakkinen , Peter Huewe Cc: David Howells , keyrings@vger.kernel.org, Linux List Kernel Mailing , syzkaller-bugs@googlegroups.com Date: Mon, 17 Dec 2018 11:51:00 -0800 In-Reply-To: References: <20181128232019.GC131170@gmail.com> <20181217181244.220052-1-ebiggers@kernel.org> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.26.6 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2018-12-17 at 11:39 -0800, Linus Torvalds wrote: > On Mon, Dec 17, 2018 at 11:06 AM Linus Torvalds > wrote: > > > > Honestly, for being about "security", all of this code seems to be > > doing some really questionable things with all those Opt_xyz enums. > > Yeah, at least security/keys/trusted.c ends up mixing that enum and > just using "int" completely randomly, and you have datablob_parse() > returning either a negative integer _or_ an "Opt_xyz" value, so > having Opt_err be -1 is doubly confusing there (it would also be "- > EPERM" depending on how you treat it). > > There doesn't seem to be any _actual_ confusion (because Opt_err is > always turned into an actual real error code), but it's just another > sign of "those enums should not be negative". > > So on the whole, I think that the "Opt_err = -1" is a serious > mistake, but at least for now, ima_policy.c clearly has (bogus) code > that relies on it. > > But the two cases that use "test_and_set_bit()" do not seem to have > any reason to use that -1 enum, so while we can't do the "just remove > -1" in general, I do think the proper fix is to just do it for those > two files. > > Eric, mind testing a patch like that? Untested patch attached just > for completeness.. If this is to replace Eric's patch, didn't you want to set token_mask to (1<