Bug#1013249: virtio_ring: module verification failed: signature and/or required key missing - tainting kernel

2022-06-19 Thread Ryutaroh Matsumoto
Package: src:linux
Version: 5.18.5-1
Severity: normal
User: debian-ri...@lists.debian.org
Usertags: riscv64
X-Debbugs-Cc: debian-ri...@lists.debian.org

Dear Maintainer,

I do not expect a kernel module in a genuine Debian kernel package
taints a kernel. But I see the following message in dmesg on
QEMU RISCV64 virt machine:

[8.038025] virtio_ring: module verification failed: signature and/or 
required key missing - tainting kernel

The QEMU is running on Debian/testing amd64 with the following version:
$ dpkg-query -W | fgrep qemu-system-misc
qemu-system-misc1:7.0+dfsg-7

The QEMU is started as follows:
qemu-system-riscv64 -machine virt,aclint=on,aia=none -m 4G -smp 4 -bios 
/usr/lib/riscv64-linux-gnu/opensbi/generic/fw_jump.elf -kernel 
/usr/lib/u-boot/qemu-riscv64_smode/uboot.elf -append "console=ttyS0 rw 
root=/dev/vda1" -netdev user,id=net0 -device virtio-net-pci,netdev=net0  
-object rng-random,filename=/dev/urandom,id=rng0 -device 
virtio-rng-pci,rng=rng0 -drive 
if=virtio,file=debian-sid-riscv64.qcow2,index=0,format=qcow2,discard=unmap,detect-zeroes=unmap

-- Package-specific info:
** Version:
Linux version 5.18.0-2-riscv64 (debian-kernel@lists.debian.org) (gcc-11 (Debian 
11.2.0-20) 11.2.0, GNU ld (GNU Binutils for Debian) 2.38) #1 SMP Debian 
5.18.5-1 (2022-06-16)

** Command line:
root=UUID=031c42a9-74c5-4b38-8e78-87d5f1141c24 rw noquiet root=/dev/vda1 
net.ifnames=0 consoleblank=0 rw

** Tainted: E (8192)
 * unsigned module was loaded

** Kernel log:
[0.00] Linux version 5.18.0-2-riscv64 (debian-kernel@lists.debian.org) 
(gcc-11 (Debian 11.2.0-20) 11.2.0, GNU ld (GNU Binutils for Debian) 2.38) #1 
SMP Debian 5.18.5-1 (2022-06-16)
[0.00] OF: fdt: Ignoring memory range 0x8000 - 0x8020
[0.00] Machine model: riscv-virtio,qemu
[0.00] efi: UEFI not found.
[0.00] NUMA: No NUMA configuration found
[0.00] NUMA: Faking a node at [mem 
0x8020-0x00017fff]
[0.00] NUMA: NODE_DATA [mem 0x17ffedbc0-0x17ffeefff]
[0.00] Zone ranges:
[0.00]   DMA32[mem 0x8020-0x]
[0.00]   Normal   [mem 0x0001-0x00017fff]
[0.00] Movable zone start for each node
[0.00] Early memory node ranges
[0.00]   node   0: [mem 0x8020-0x00017fff]
[0.00] Initmem setup node 0 [mem 0x8020-0x00017fff]
[0.00] On node 0, zone DMA32: 512 pages in unavailable ranges
[0.00] SBI specification v0.3 detected
[0.00] SBI implementation ID=0x1 Version=0x1
[0.00] SBI TIME extension detected
[0.00] SBI IPI extension detected
[0.00] SBI RFENCE extension detected
[0.00] SBI SRST extension detected
[0.00] SBI HSM extension detected
[0.00] riscv: base ISA extensions acdfhim
[0.00] riscv: ELF capabilities acdfim
[0.00] percpu: cpu 0 has no node -1 or node-local memory
[0.00] percpu: Embedded 27 pages/cpu s72744 r8192 d29656 u110592
[0.00] pcpu-alloc: s72744 r8192 d29656 u110592 alloc=27*4096
[0.00] pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 
[0.00] Fallback order for Node 0: 0 
[0.00] Built 1 zonelists, mobility grouping on.  Total pages: 1031688
[0.00] Policy zone: Normal
[0.00] Kernel command line: 
root=UUID=031c42a9-74c5-4b38-8e78-87d5f1141c24 rw noquiet root=/dev/vda1 
net.ifnames=0 consoleblank=0 rw
[0.00] Unknown kernel command line parameters "noquiet", will be passed 
to user space.
[0.00] Dentry cache hash table entries: 524288 (order: 10, 4194304 
bytes, linear)
[0.00] Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, 
linear)
[0.00] mem auto-init: stack:off, heap alloc:on, heap free:off
[0.00] software IO TLB: mapped [mem 
0xfb73a000-0xff73a000] (64MB)
[0.00] Memory: 2079280K/4192256K available (7539K kernel code, 5095K 
rwdata, 4096K rodata, 2456K init, 426K bss, 252764K reserved, 0K cma-reserved)
[0.00] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1
[0.00] ftrace: allocating 28720 entries in 113 pages
[0.00] ftrace: allocated 113 pages with 4 groups
[0.00] trace event string verifier disabled
[0.00] rcu: Hierarchical RCU implementation.
[0.00] rcu: RCU restricting CPUs from NR_CPUS=8 to nr_cpu_ids=4.
[0.00]  Rude variant of Tasks RCU enabled.
[0.00]  Tracing variant of Tasks RCU enabled.
[0.00] rcu: RCU calculated value of scheduler-enlistment delay is 25 
jiffies.
[0.00] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4
[0.00] NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0
[0.00] riscv-intc: 64 local interrupts mapped
[0.00] plic: plic@c00: mapped 53 interrupts with 4 handlers for 8 
contexts.
[0.00] riscv_timer_init_dt: Registering clocksource cpuid 

Processed: Re: Setting the summary of the bug

2022-06-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> summary 1012835 See 
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012835#23 for a summary of 
> this bug
Summary replaced with message bug 1012835 message 
Summary replaced with message bug 1012835 message 
Summary replaced with message bug 1012835 message 
>
End of message, stopping processing here.

Please contact me if you need assistance.
-- 
1012835: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012835
1013192: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013192
1013241: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013241
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Setting the summary of the bug

2022-06-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> summary 1012835 23
Summary recorded from message bug 1012835 message 23
Summary recorded from message bug 1012835 message 23
Summary recorded from message bug 1012835 message 23
>
End of message, stopping processing here.

Please contact me if you need assistance.
-- 
1012835: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012835
1013192: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013192
1013241: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013241
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1012835: Summary

2022-06-19 Thread Diederik de Haas
The random number generator has undergone a few important changes for 
[uptream] Linux 5.17 and 5.18, in an attempt to modernize both the code and 
the cryptography used.
Details: https://www.zx2c4.com/projects/linux-rng-5.17-5.18/

The most visible aspect of this, and the likely reason for several bug 
reports, is that the size of the entropy pool went down from ~3000+ to 256.
This is an intentional upstream change and NOT a bug in the Debian kernel.
The 'wontfix' tag is therefor added to this bug (and therefor merged bugs).

These changes have also been backported to other LTS kernels, including 
the 5.10 kernel used in Debian Bullseye. 
Almost the whole upstream 5.10.119 release consist of these changes.
There have been extensive commit messages, so next to the above referenced 
document, ``git log v5.10.118..v5.10.119`` should give you (more) details.

signature.asc
Description: This is a digitally signed message part.


Processed: Tagging it as upstream

2022-06-19 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org:

> tag 1012835 upstream
Bug #1012835 [src:linux] linux-image-5.10.0-15-amd64: entropy dropped to 256 
from ~4k after 5.10.120-1 update
Bug #1013192 [src:linux] linux-image-5.10.0-15-amd64: ridiculously small 
entropy pool
Bug #1013241 [src:linux] upgrade-reports: kernel upgrade 5.10.0.9 to 5.10.0.15
Added tag(s) upstream.
Added tag(s) upstream.
Added tag(s) upstream.
>
End of message, stopping processing here.

Please contact me if you need assistance.
-- 
1012835: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012835
1013192: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013192
1013241: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013241
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Processed: Re: Bug#1013241: upgrade-reports: kernel upgrade 5.10.0.9 to 5.10.0.15

2022-06-19 Thread Debian Bug Tracking System
Processing control commands:

> merge -1 1013192
Bug #1013241 [src:linux] upgrade-reports: kernel upgrade 5.10.0.9 to 5.10.0.15
Bug #1013241 [src:linux] upgrade-reports: kernel upgrade 5.10.0.9 to 5.10.0.15
Marked as found in versions linux/5.10.120-1.
Added tag(s) security and wontfix.
Bug #1012835 [src:linux] linux-image-5.10.0-15-amd64: entropy dropped to 256 
from ~4k after 5.10.120-1 update
Bug #1013192 [src:linux] linux-image-5.10.0-15-amd64: ridiculously small 
entropy pool
Merged 1012835 1013192 1013241

-- 
1012835: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012835
1013192: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013192
1013241: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013241
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Bug#1013241: upgrade-reports: kernel upgrade 5.10.0.9 to 5.10.0.15

2022-06-19 Thread Diederik de Haas
Control: merge -1 1013192

On zondag 19 juni 2022 22:09:08 CEST Paul Gevers wrote:
> On 19-06-2022 21:48, NormanMurray wrote:
> 
> > With 5.10.0.9, randomsound worked well to keep
> > /proc/sys/kernel/random/entropy_avail up at set point and
> > /proc/sys/kernel/random/poolsize at 4096
> >  With 5.10.0.15, randomsound did
> > not work to keep /proc/sys/kernel/random/entropy_avail up at set point
> > and /proc/sys/kernel/random/poolsize was set at 256 I down graded back to
> > 5.10.0.9
> 
> I've seen the same drop in entropy_avail, but the changelog mentioned a 
> lot of changes to random, so I interpreted that as being intended. I've 
> reassigned to the linux source package, as they can confirm that this is 
> not a bug, or treat it appropriately.

See the bug with which this one will be merged for details, especially 
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013192#19

This is an intentional change in the upstream kernel.

signature.asc
Description: This is a digitally signed message part.


Processed: Re: Bug#1013241: upgrade-reports: kernel upgrade 5.10.0.9 to 5.10.0.15

2022-06-19 Thread Debian Bug Tracking System
Processing control commands:

> reassign -1 src:linux
Bug #1013241 [upgrade-reports] upgrade-reports: kernel upgrade 5.10.0.9 to 
5.10.0.15
Bug reassigned from package 'upgrade-reports' to 'src:linux'.
Ignoring request to alter found versions of bug #1013241 to the same values 
previously set
Ignoring request to alter fixed versions of bug #1013241 to the same values 
previously set

-- 
1013241: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1013241
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems



Re: Bug#1013241: upgrade-reports: kernel upgrade 5.10.0.9 to 5.10.0.15

2022-06-19 Thread Paul Gevers

Control: reassign -1 src:linux

Hi Norman,

On 19-06-2022 21:48, NormanMurray wrote:

Package: upgrade-reports
Severity: normal
X-Debbugs-Cc: nmur...@telusplanet.net





With 5.10.0.9, randomsound worked well to keep 
/proc/sys/kernel/random/entropy_avail up at set point and 
/proc/sys/kernel/random/poolsize at 4096
With 5.10.0.15, randomsound did not work to keep 
/proc/sys/kernel/random/entropy_avail up at set point and 
/proc/sys/kernel/random/poolsize was set at 256
I down graded back to 5.10.0.9


I've seen the same drop in entropy_avail, but the changelog mentioned a 
lot of changes to random, so I interpreted that as being intended. I've 
reassigned to the linux source package, as they can confirm that this is 
not a bug, or treat it appropriately.


Paul


OpenPGP_signature
Description: OpenPGP digital signature


Bug#1012741: modprobe: ERROR: could not insert 'crc_itu_t': Key was rejected by service

2022-06-19 Thread Ben Hutchings
On Sat, 2022-06-18 at 16:21 +0200, Ben Hutchings wrote:
> On Thu, 2022-06-16 at 01:28 +0200, Ben Hutchings wrote:
> [...]
> 
> > linux-image-4.19.0-17-amd64 4.19.194-1 
> > lib/modules/4.19.0-17-amd64/kernel/drivers/dma/dw/dw_dmac_core.ko
> > linux-image-4.19.0-17-amd64 4.19.194-2 
> > lib/modules/4.19.0-17-amd64/kernel/drivers/dma/dw/dw_dmac_core.ko
> > linux-image-4.19.0-17-amd64 4.19.194-3 
> > lib/modules/4.19.0-17-amd64/kernel/drivers/dma/dw/dw_dmac_core.ko
> [...]
> > A significant pattern visible here is a short signature for the same
> > module in multiple consecutive versions, where the module may have
> > identical contents.  That implies that this is a reproducible issue for
> > certain inputs that cannot be worked around by re-running the signing
> > process.
> > 
> > However, I have *not* yet verified that all short signatures really are
> > invalid.
> 
> These module files are indeed identical, and their signatures are
> rejected by the kernel.
> 
> I'm now looking at whether the missing bytes are recoverable (e.g. are
> they always zeroes).
[...]

I wrote a script to try all possible byte values for 2 bytes before or
after the short signature.  For this particular file, none of them
producd a valid signature.  So the short signatures seem to be
corrupted in a more complex way.

In the mean time, we have another security update coming which might
not hit this bug again.  But there are 28,679 signed binaries across
the three architectures, so the probability is only about 65%.

Ben.

-- 
Ben Hutchings
The most exhausting thing in life is being insincere.
 - Anne Morrow Lindberg


signature.asc
Description: This is a digitally signed message part