lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAKv+Gu_y++P259Bi92kJr0XHxw8Tvpag74vvFiPQf34DmJq3uw@mail.gmail.com>
Date:   Tue, 12 Feb 2019 11:11:07 +0100
From:   Ard Biesheuvel <ard.biesheuvel@...aro.org>
To:     Anders Roxell <anders.roxell@...aro.org>
Cc:     Mimi Zohar <zohar@...ux.ibm.com>, dmitry.kasatkin@...il.com,
        James Morris <jmorris@...ei.org>,
        "Serge E. Hallyn" <serge@...lyn.com>,
        Thomas Gleixner <tglx@...utronix.de>,
        Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
        linux-integrity <linux-integrity@...r.kernel.org>,
        linux-security-module <linux-security-module@...r.kernel.org>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        "the arch/x86 maintainers" <x86@...nel.org>,
        linux-efi <linux-efi@...r.kernel.org>,
        platform-driver-x86@...r.kernel.org
Subject: Re: [PATCH 2/2] efi: fix build error redeclaration of enumerator

On Tue, 12 Feb 2019 at 11:09, Anders Roxell <anders.roxell@...aro.org> wrote:
>
> Commit a893ea15d764 ("tpm: move tpm_chip definition to
> include/linux/tpm.h") introduced a build error when both ima and efi is
> enabled. What happens is that both headers (ima.h and efi.h) defines the
> same 'NONE' constant, and it broke when they started getting included
> from the same file.
>
> In file included from ../security/integrity/ima/ima_fs.c:30:
> ../security/integrity/ima/ima.h:176:7: error: redeclaration of enumerator "NONE"
>   hook(NONE)   \
>        ^~~~
> ../security/integrity/ima/ima.h:188:34: note: in definition of macro "__ima_hook_enumify"
>  #define __ima_hook_enumify(ENUM) ENUM,
>                                   ^~~~
> ../security/integrity/ima/ima.h:191:2: note: in expansion of macro "__ima_hooks"
>   __ima_hooks(__ima_hook_enumify)
>   ^~~~~~~~~~~
> In file included from ../arch/arm64/include/asm/acpi.h:15,
>                  from ../include/acpi/acpi_io.h:7,
>                  from ../include/linux/acpi.h:47,
>                  from ../include/linux/tpm.h:26,
>                  from ../security/integrity/ima/ima.h:25,
>                  from ../security/integrity/ima/ima_fs.c:30:
> ../include/linux/efi.h:1723:2: note: previous definition of "NONE" was here
>   NONE,
>   ^~~~
> make[4]: *** [../scripts/Makefile.build:277: security/integrity/ima/ima_fs.o] Error 1
>
> Rework to prefix the efi enum with 'EFI_*'.
>
> Signed-off-by: Anders Roxell <anders.roxell@...aro.org>
> ---
>
> We only need one of the two patches applied.

Thanks Anders.

I'd argue that we should apply both patches. 'NONE' is far too
generic, so it requires a subsystem prefix if it has a special meaning
inside a subsystem.

>
>  arch/x86/platform/efi/quirks.c          |  2 +-
>  drivers/firmware/efi/runtime-wrappers.c | 48 ++++++++++++-------------
>  include/linux/efi.h                     | 26 +++++++-------
>  3 files changed, 38 insertions(+), 38 deletions(-)
>
> diff --git a/arch/x86/platform/efi/quirks.c b/arch/x86/platform/efi/quirks.c
> index 9ce85e605052..b7c0b04ee6ad 100644
> --- a/arch/x86/platform/efi/quirks.c
> +++ b/arch/x86/platform/efi/quirks.c
> @@ -742,7 +742,7 @@ void efi_recover_from_page_fault(unsigned long phys_addr)
>          * because this case occurs *very* rarely and hence could be improved
>          * on a need by basis.
>          */
> -       if (efi_rts_work.efi_rts_id == RESET_SYSTEM) {
> +       if (efi_rts_work.efi_rts_id == EFI_RESET_SYSTEM) {
>                 pr_info("efi_reset_system() buggy! Reboot through BIOS\n");
>                 machine_real_restart(MRR_BIOS);
>                 return;
> diff --git a/drivers/firmware/efi/runtime-wrappers.c b/drivers/firmware/efi/runtime-wrappers.c
> index c70df5ae7c4a..28138534643e 100644
> --- a/drivers/firmware/efi/runtime-wrappers.c
> +++ b/drivers/firmware/efi/runtime-wrappers.c
> @@ -85,7 +85,7 @@ struct efi_runtime_work efi_rts_work;
>                 pr_err("Failed to queue work to efi_rts_wq.\n");        \
>                                                                         \
>  exit:                                                                  \
> -       efi_rts_work.efi_rts_id = NONE;                                 \
> +       efi_rts_work.efi_rts_id = EFI_NONE;                             \
>         efi_rts_work.status;                                            \
>  })
>
> @@ -181,50 +181,50 @@ static void efi_call_rts(struct work_struct *work)
>         arg5 = efi_rts_work.arg5;
>
>         switch (efi_rts_work.efi_rts_id) {
> -       case GET_TIME:
> +       case EFI_GET_TIME:
>                 status = efi_call_virt(get_time, (efi_time_t *)arg1,
>                                        (efi_time_cap_t *)arg2);
>                 break;
> -       case SET_TIME:
> +       case EFI_SET_TIME:
>                 status = efi_call_virt(set_time, (efi_time_t *)arg1);
>                 break;
> -       case GET_WAKEUP_TIME:
> +       case EFI_GET_WAKEUP_TIME:
>                 status = efi_call_virt(get_wakeup_time, (efi_bool_t *)arg1,
>                                        (efi_bool_t *)arg2, (efi_time_t *)arg3);
>                 break;
> -       case SET_WAKEUP_TIME:
> +       case EFI_SET_WAKEUP_TIME:
>                 status = efi_call_virt(set_wakeup_time, *(efi_bool_t *)arg1,
>                                        (efi_time_t *)arg2);
>                 break;
> -       case GET_VARIABLE:
> +       case EFI_GET_VARIABLE:
>                 status = efi_call_virt(get_variable, (efi_char16_t *)arg1,
>                                        (efi_guid_t *)arg2, (u32 *)arg3,
>                                        (unsigned long *)arg4, (void *)arg5);
>                 break;
> -       case GET_NEXT_VARIABLE:
> +       case EFI_GET_NEXT_VARIABLE:
>                 status = efi_call_virt(get_next_variable, (unsigned long *)arg1,
>                                        (efi_char16_t *)arg2,
>                                        (efi_guid_t *)arg3);
>                 break;
> -       case SET_VARIABLE:
> +       case EFI_SET_VARIABLE:
>                 status = efi_call_virt(set_variable, (efi_char16_t *)arg1,
>                                        (efi_guid_t *)arg2, *(u32 *)arg3,
>                                        *(unsigned long *)arg4, (void *)arg5);
>                 break;
> -       case QUERY_VARIABLE_INFO:
> +       case EFI_QUERY_VARIABLE_INFO:
>                 status = efi_call_virt(query_variable_info, *(u32 *)arg1,
>                                        (u64 *)arg2, (u64 *)arg3, (u64 *)arg4);
>                 break;
> -       case GET_NEXT_HIGH_MONO_COUNT:
> +       case EFI_GET_NEXT_HIGH_MONO_COUNT:
>                 status = efi_call_virt(get_next_high_mono_count, (u32 *)arg1);
>                 break;
> -       case UPDATE_CAPSULE:
> +       case EFI_UPDATE_CAPSULE:
>                 status = efi_call_virt(update_capsule,
>                                        (efi_capsule_header_t **)arg1,
>                                        *(unsigned long *)arg2,
>                                        *(unsigned long *)arg3);
>                 break;
> -       case QUERY_CAPSULE_CAPS:
> +       case EFI_QUERY_CAPSULE_CAPS:
>                 status = efi_call_virt(query_capsule_caps,
>                                        (efi_capsule_header_t **)arg1,
>                                        *(unsigned long *)arg2, (u64 *)arg3,
> @@ -248,7 +248,7 @@ static efi_status_t virt_efi_get_time(efi_time_t *tm, efi_time_cap_t *tc)
>
>         if (down_interruptible(&efi_runtime_lock))
>                 return EFI_ABORTED;
> -       status = efi_queue_work(GET_TIME, tm, tc, NULL, NULL, NULL);
> +       status = efi_queue_work(EFI_GET_TIME, tm, tc, NULL, NULL, NULL);
>         up(&efi_runtime_lock);
>         return status;
>  }
> @@ -259,7 +259,7 @@ static efi_status_t virt_efi_set_time(efi_time_t *tm)
>
>         if (down_interruptible(&efi_runtime_lock))
>                 return EFI_ABORTED;
> -       status = efi_queue_work(SET_TIME, tm, NULL, NULL, NULL, NULL);
> +       status = efi_queue_work(EFI_SET_TIME, tm, NULL, NULL, NULL, NULL);
>         up(&efi_runtime_lock);
>         return status;
>  }
> @@ -272,7 +272,7 @@ static efi_status_t virt_efi_get_wakeup_time(efi_bool_t *enabled,
>
>         if (down_interruptible(&efi_runtime_lock))
>                 return EFI_ABORTED;
> -       status = efi_queue_work(GET_WAKEUP_TIME, enabled, pending, tm, NULL,
> +       status = efi_queue_work(EFI_GET_WAKEUP_TIME, enabled, pending, tm, NULL,
>                                 NULL);
>         up(&efi_runtime_lock);
>         return status;
> @@ -284,7 +284,7 @@ static efi_status_t virt_efi_set_wakeup_time(efi_bool_t enabled, efi_time_t *tm)
>
>         if (down_interruptible(&efi_runtime_lock))
>                 return EFI_ABORTED;
> -       status = efi_queue_work(SET_WAKEUP_TIME, &enabled, tm, NULL, NULL,
> +       status = efi_queue_work(EFI_SET_WAKEUP_TIME, &enabled, tm, NULL, NULL,
>                                 NULL);
>         up(&efi_runtime_lock);
>         return status;
> @@ -300,7 +300,7 @@ static efi_status_t virt_efi_get_variable(efi_char16_t *name,
>
>         if (down_interruptible(&efi_runtime_lock))
>                 return EFI_ABORTED;
> -       status = efi_queue_work(GET_VARIABLE, name, vendor, attr, data_size,
> +       status = efi_queue_work(EFI_GET_VARIABLE, name, vendor, attr, data_size,
>                                 data);
>         up(&efi_runtime_lock);
>         return status;
> @@ -314,7 +314,7 @@ static efi_status_t virt_efi_get_next_variable(unsigned long *name_size,
>
>         if (down_interruptible(&efi_runtime_lock))
>                 return EFI_ABORTED;
> -       status = efi_queue_work(GET_NEXT_VARIABLE, name_size, name, vendor,
> +       status = efi_queue_work(EFI_GET_NEXT_VARIABLE, name_size, name, vendor,
>                                 NULL, NULL);
>         up(&efi_runtime_lock);
>         return status;
> @@ -330,7 +330,7 @@ static efi_status_t virt_efi_set_variable(efi_char16_t *name,
>
>         if (down_interruptible(&efi_runtime_lock))
>                 return EFI_ABORTED;
> -       status = efi_queue_work(SET_VARIABLE, name, vendor, &attr, &data_size,
> +       status = efi_queue_work(EFI_SET_VARIABLE, name, vendor, &attr, &data_size,
>                                 data);
>         up(&efi_runtime_lock);
>         return status;
> @@ -365,7 +365,7 @@ static efi_status_t virt_efi_query_variable_info(u32 attr,
>
>         if (down_interruptible(&efi_runtime_lock))
>                 return EFI_ABORTED;
> -       status = efi_queue_work(QUERY_VARIABLE_INFO, &attr, storage_space,
> +       status = efi_queue_work(EFI_QUERY_VARIABLE_INFO, &attr, storage_space,
>                                 remaining_space, max_variable_size, NULL);
>         up(&efi_runtime_lock);
>         return status;
> @@ -397,7 +397,7 @@ static efi_status_t virt_efi_get_next_high_mono_count(u32 *count)
>
>         if (down_interruptible(&efi_runtime_lock))
>                 return EFI_ABORTED;
> -       status = efi_queue_work(GET_NEXT_HIGH_MONO_COUNT, count, NULL, NULL,
> +       status = efi_queue_work(EFI_GET_NEXT_HIGH_MONO_COUNT, count, NULL, NULL,
>                                 NULL, NULL);
>         up(&efi_runtime_lock);
>         return status;
> @@ -413,7 +413,7 @@ static void virt_efi_reset_system(int reset_type,
>                         "could not get exclusive access to the firmware\n");
>                 return;
>         }
> -       efi_rts_work.efi_rts_id = RESET_SYSTEM;
> +       efi_rts_work.efi_rts_id = EFI_RESET_SYSTEM;
>         __efi_call_virt(reset_system, reset_type, status, data_size, data);
>         up(&efi_runtime_lock);
>  }
> @@ -429,7 +429,7 @@ static efi_status_t virt_efi_update_capsule(efi_capsule_header_t **capsules,
>
>         if (down_interruptible(&efi_runtime_lock))
>                 return EFI_ABORTED;
> -       status = efi_queue_work(UPDATE_CAPSULE, capsules, &count, &sg_list,
> +       status = efi_queue_work(EFI_UPDATE_CAPSULE, capsules, &count, &sg_list,
>                                 NULL, NULL);
>         up(&efi_runtime_lock);
>         return status;
> @@ -447,7 +447,7 @@ static efi_status_t virt_efi_query_capsule_caps(efi_capsule_header_t **capsules,
>
>         if (down_interruptible(&efi_runtime_lock))
>                 return EFI_ABORTED;
> -       status = efi_queue_work(QUERY_CAPSULE_CAPS, capsules, &count,
> +       status = efi_queue_work(EFI_QUERY_CAPSULE_CAPS, capsules, &count,
>                                 max_size, reset_type, NULL);
>         up(&efi_runtime_lock);
>         return status;
> diff --git a/include/linux/efi.h b/include/linux/efi.h
> index a4de93c96907..b3471b6ff92f 100644
> --- a/include/linux/efi.h
> +++ b/include/linux/efi.h
> @@ -1720,19 +1720,19 @@ extern int efi_tpm_eventlog_init(void);
>   * fault happened while executing an efi runtime service.
>   */
>  enum efi_rts_ids {
> -       NONE,
> -       GET_TIME,
> -       SET_TIME,
> -       GET_WAKEUP_TIME,
> -       SET_WAKEUP_TIME,
> -       GET_VARIABLE,
> -       GET_NEXT_VARIABLE,
> -       SET_VARIABLE,
> -       QUERY_VARIABLE_INFO,
> -       GET_NEXT_HIGH_MONO_COUNT,
> -       RESET_SYSTEM,
> -       UPDATE_CAPSULE,
> -       QUERY_CAPSULE_CAPS,
> +       EFI_NONE,
> +       EFI_GET_TIME,
> +       EFI_SET_TIME,
> +       EFI_GET_WAKEUP_TIME,
> +       EFI_SET_WAKEUP_TIME,
> +       EFI_GET_VARIABLE,
> +       EFI_GET_NEXT_VARIABLE,
> +       EFI_SET_VARIABLE,
> +       EFI_QUERY_VARIABLE_INFO,
> +       EFI_GET_NEXT_HIGH_MONO_COUNT,
> +       EFI_RESET_SYSTEM,
> +       EFI_UPDATE_CAPSULE,
> +       EFI_QUERY_CAPSULE_CAPS,
>  };
>
>  /*
> --
> 2.20.1
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ