From: David Howells <dhowells@redhat.com> To: Jarkko Sakkinen <jarkko@kernel.org> Cc: dhowells@redhat.com, =?iso-8859-1?Q?Micka=EBl_Sala=FCn?= <mic@digikod.net>, "David Woodhouse" <dwmw2@infradead.org>, "David S . Miller" <davem@davemloft.net>, "Eric Snowberg" <eric.snowberg@oracle.com>, "Herbert Xu" <herbert@gondor.apana.org.au>, "James Morris" <jmorris@namei.org>, =?iso-8859-1?Q?Micka=EBl_Sala=FCn?= <mic@linux.microsoft.com>, "Mimi Zohar" <zohar@linux.ibm.com>, "Serge E . Hallyn" <serge@hallyn.com>, "Tyler Hicks" <tyhicks@linux.microsoft.com>, keyrings@vger.kernel.org, linux-crypto@vger.kernel.org, linux-integrity@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring Date: Wed, 30 Mar 2022 14:44:00 +0100 [thread overview] Message-ID: <2937432.1648647840@warthog.procyon.org.uk> (raw) In-Reply-To: <YidDznCPSmFmfNwE@iki.fi> Jarkko Sakkinen <jarkko@kernel.org> wrote: > > /* > > * Initialise the blacklist > > */ > > static int __init blacklist_init(void) > > { > > const char *const *bl; > > + struct key_restriction *restriction; > > > > if (register_key_type(&key_type_blacklist) < 0) > > panic("Can't allocate system blacklist key type\n"); > > > > + restriction = kzalloc(sizeof(*restriction), GFP_KERNEL); > > + if (!restriction) > > + panic("Can't allocate blacklist keyring restriction\n"); > > > This prevents me from taking this to my pull request. In moderns standards, > no new BUG_ON(), panic() etc. should never added to the kernel. I would argue that in this case, though, it is reasonable. This should only be called during kernel initialisation and, as Mickaël points out, if you can't allocate that small amount of memory, the kernel isn't going to boot much further. > I missed this in my review. > > This should rather be e.g. > > restriction = kzalloc(sizeof(*restriction), GFP_KERNEL); > if (!restriction) { > pr_err("Can't allocate blacklist keyring restriction\n"); > return 0; > } You can't just return 0. That indicates success - but if by some miracle, the kernel actually gets to a point where userspace can happen, it could mean that we're missing the security restrictions of the blacklist. Now, we could defer the panic to add_key_to_revocation_list(), but if you can't set in place the required security restrictions, I think it's arguable that the kernel either needs to panic or it needs to blacklist everything. David
next prev parent reply other threads:[~2022-03-30 13:44 UTC|newest] Thread overview: 25+ messages / expand[flat|nested] mbox.gz Atom feed top 2021-07-12 17:03 [PATCH v8 0/5] Enable root to update " Mickaël Salaün 2021-07-12 17:03 ` [PATCH v8 1/5] tools/certs: Add print-cert-tbs-hash.sh Mickaël Salaün 2021-07-12 17:03 ` [PATCH v8 2/5] certs: Check that builtin blacklist hashes are valid Mickaël Salaün 2021-07-12 17:03 ` [PATCH v8 3/5] certs: Make blacklist_vet_description() more strict Mickaël Salaün 2021-07-12 17:03 ` [PATCH v8 4/5] certs: Factor out the blacklist hash creation Mickaël Salaün 2021-07-12 17:03 ` [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring Mickaël Salaün 2022-03-08 11:53 ` Jarkko Sakkinen 2022-03-08 12:18 ` Mickaël Salaün 2022-03-08 13:19 ` Jarkko Sakkinen 2022-03-08 16:02 ` Mickaël Salaün 2022-03-09 16:01 ` Jarkko Sakkinen 2022-03-09 18:36 ` Mickaël Salaün 2022-03-09 23:11 ` Jarkko Sakkinen 2022-03-11 16:36 ` Mickaël Salaün 2022-03-11 16:45 ` Jarkko Sakkinen 2022-03-30 13:44 ` David Howells [this message] 2021-12-13 15:30 ` [PATCH v8 0/5] Enable root to update " Mickaël Salaün 2021-12-21 8:50 ` Jarkko Sakkinen 2022-01-04 15:56 ` Mickaël Salaün 2022-01-06 19:12 ` Jarkko Sakkinen 2022-01-06 19:16 ` Jarkko Sakkinen 2022-01-07 12:14 ` Mickaël Salaün 2022-01-31 11:33 ` Mickaël Salaün 2022-02-17 19:58 ` Jarkko Sakkinen 2022-02-19 11:42 ` Jarkko Sakkinen
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=2937432.1648647840@warthog.procyon.org.uk \ --to=dhowells@redhat.com \ --cc=davem@davemloft.net \ --cc=dwmw2@infradead.org \ --cc=eric.snowberg@oracle.com \ --cc=herbert@gondor.apana.org.au \ --cc=jarkko@kernel.org \ --cc=jmorris@namei.org \ --cc=keyrings@vger.kernel.org \ --cc=linux-crypto@vger.kernel.org \ --cc=linux-integrity@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-security-module@vger.kernel.org \ --cc=mic@digikod.net \ --cc=mic@linux.microsoft.com \ --cc=serge@hallyn.com \ --cc=tyhicks@linux.microsoft.com \ --cc=zohar@linux.ibm.com \ --subject='Re: [PATCH v8 5/5] certs: Allow root user to append signed hashes to the blacklist keyring' \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).