Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp14152435rwb; Sun, 27 Nov 2022 18:42:36 -0800 (PST) X-Google-Smtp-Source: AA0mqf6FASVNd37HCSH/MvquHq+PV52IRoe4dDZbP8TlAq5tuyB01IRYUWjtyXQzMmY07VbfVqvI X-Received: by 2002:aa7:cc08:0:b0:461:8a43:e93 with SMTP id q8-20020aa7cc08000000b004618a430e93mr43791591edt.275.1669603356538; Sun, 27 Nov 2022 18:42:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669603356; cv=none; d=google.com; s=arc-20160816; b=CzVVx6s3xMgTVsgKCRtYZ1bwxEPA8Z1vP9KUz15/Gp+mEwB6eULBpINZwDPBpglBzl c/ytt6QixZuwqsSh5Xl/wgpMyf4m99Jdk5SerTciTGPCZ6jt/qYBvyOZchrNgMDKE//8 2XFw0l/BttPyd/ck81ERHpz1H4k1wGrNrSKwnOAizdCkThzDbSKNLVKk8Xhbnc13ZwSq LG94/MNxeaHUjJ3+IjpH18vGO8ref/jMOkHTvD+z5LrsOMBWYMsm2pV6xQmfMQ5D26xn Y4ykp2jRNK7i/ox2xn2HhJTEUu4N1yZ5x6qqJ4fPOORYUJvJ7RZLDCA11oYBAEgNydz4 k0zg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:jabber-id:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:dkim-signature:date; bh=o5CbggJEhEjK2bw4zNgnO22wisLQV6IBexrTdVB4JdU=; b=F2MvPFA/5ag3XwERA2q4U/2a3r4LtIlgm9yddJtxxnlpS86CGnuK0BN4uhkak7H0PP dl30OKK2XsV+l5tosi9AWASaygvFOCy3JJBbIo4G7SD8xoQ79817LL0SpYicyI8fyogN X/1rWtQJF1bX8pKUindvc/d3tm88jKu7iRQWrneVp24cBCaxMrAYqrdmLEd/dbiTirdk HidZ/bo3ndFlClSnJHH88dPZS6Sb7wrQ7qH0TB+6E4exSIeeR0Re8OEsH4TDT4sNu8Pz fPqtStj7rGF6ItyoKIZzzQC+rnauP5NGtBfn5dd2JcagSiIfwN2+95+XRX/IKLjVHqHY azvg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@weissschuh.net header.s=mail header.b=oEgFqC5b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ho34-20020a1709070ea200b0078ddd8656d9si10064589ejc.9.2022.11.27.18.42.14; Sun, 27 Nov 2022 18:42:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=fail header.i=@weissschuh.net header.s=mail header.b=oEgFqC5b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229784AbiK1B7b (ORCPT + 84 others); Sun, 27 Nov 2022 20:59:31 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56322 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229504AbiK1B7a (ORCPT ); Sun, 27 Nov 2022 20:59:30 -0500 Received: from todd.t-8ch.de (todd.t-8ch.de [159.69.126.157]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 625E6DFFF; Sun, 27 Nov 2022 17:59:29 -0800 (PST) Date: Mon, 28 Nov 2022 02:59:20 +0100 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=weissschuh.net; s=mail; t=1669600767; bh=6bLjo6zSUiel5ocq0aZAs181VjD/dTQcfURr0PI89DI=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=oEgFqC5bZJylcOj3OUuUE57So9eNi4aGm4JR+yTVOjMtCr1+EimA4Lm4X5bGV3hkg Bqf/KYPqlrYvrwi3JOOk3LBckYrlVnbn+gNrNrAbJoDIbwf0DAM3Jnc45a38n9yDKo jOgUz3mxYrj41XnBxeAwr7su/LlFa2baKlQbmJtM= From: Thomas =?utf-8?Q?Wei=C3=9Fschuh?= To: Jarkko Sakkinen Cc: =?utf-8?Q?Micka=C3=ABl_Sala=C3=BCn?= , David Howells , David Woodhouse , Eric Snowberg , keyrings@vger.kernel.org, linux-kernel@vger.kernel.org, Mark Pearson , linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org Subject: Re: [PATCH v3 1/3] certs: log hash value on blacklist error Message-ID: <8b9e9bf8-ae44-485a-9b30-85a71a236f06@t-8ch.de> References: <20221118040343.2958-1-linux@weissschuh.net> <20221118040343.2958-2-linux@weissschuh.net> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Jabber-ID: thomas@t-8ch.de X-Accept: text/plain, text/html;q=0.2, text/*;q=0.1 X-Accept-Language: en-us, en;q=0.8, de-de;q=0.7, de;q=0.6 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022-11-28 03:11+0200, Jarkko Sakkinen wrote: > "Make blacklisted hash available in klog" > > On Fri, Nov 18, 2022 at 05:03:41AM +0100, Thomas Weißschuh wrote: > > Without this information these logs are not actionable. > > Without blacklisted hash? > > > For example on duplicate blacklisted hashes reported by the system > > firmware users should be able to report the erroneous hashes to their > > system vendors. > > > > While we are at it use the dedicated format string for ERR_PTR. > > Lacks the beef so saying "while we are at it" makes no sense. What about this: [PATCH] certs: make blacklisted hash available in klog One common situation triggering this log statement are duplicate hashes reported by the system firmware. These duplicates should be removed from the firmware. Without logging the blacklisted hash triggering the issue however the users can not report it properly to the firmware vendors and the firmware vendors can not easily see which specific hash is duplicated. While changing the log message also use the dedicated ERR_PTR format placeholder for the returned error value. > > Fixes: 6364d106e041 ("certs: Allow root user to append signed hashes to the blacklist keyring") > > Why does this count as a bug? These error logs are confusing to users, prompting them to waste time investigating them and even mess with their firmware settings. (As indicated in the threads linked from the cover letter) The most correct fix would be patches 2 and 3 from this series. I was not sure if patch 2 would be acceptable for stable as it introduces new infrastructure code. So patch 1 enables users to report the issue to their firmware vendors and get the spurious logs resolved that way. If these assumptions are incorrect I can fold patch 1 into patch 3. But are patch 2 and 3 material for stable? > > Signed-off-by: Thomas Weißschuh > > --- > > certs/blacklist.c | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > diff --git a/certs/blacklist.c b/certs/blacklist.c > > index 41f10601cc72..6e260c4b6a19 100644 > > --- a/certs/blacklist.c > > +++ b/certs/blacklist.c > > @@ -192,7 +192,7 @@ static int mark_raw_hash_blacklisted(const char *hash) > > KEY_ALLOC_NOT_IN_QUOTA | > > KEY_ALLOC_BUILT_IN); > > if (IS_ERR(key)) { > > - pr_err("Problem blacklisting hash (%ld)\n", PTR_ERR(key)); > > + pr_err("Problem blacklisting hash %s: %pe\n", hash, key); > > return PTR_ERR(key); > > } > > return 0; > > -- > > 2.38.1 > > > > BR, Jarkko