From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-dy1-f181.google.com (mail-dy1-f181.google.com [74.125.82.181]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7F9112FE56E for ; Sat, 11 Apr 2026 20:12:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=74.125.82.181 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775938340; cv=none; b=FYRTxsSBmL7owZb5sQn24/ec57UHixymcsFFUySsmAJlPKgN36F5Hz797UtEBw96BlStGGlih2CRdqyHpEUY/OB/R6fa66yIgsUp/1ToIqgXqwJDUNp0uPt+fvGmjRb98cJdv2zMhzcjQXP7V5wFpm83yMACLsfT7vykG5DWmuE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775938340; c=relaxed/simple; bh=0zKbvspdxhnZRPxYXPH+dPdWs7eab1kfHTzyuRZUC6w=; h=From:Date:Subject:MIME-Version:Content-Type:Message-Id:To:Cc; b=j3Kf/qw+7oJBmpy3+d0b+bI3KuJd2H4IZ3TcVPBA0mYa1lcB8Fw4AWvLWAuz/hFuamiTs3+ciZ6IvXlglgsPwLH4F+SmlZjibw545VkUmtC+PPGf2lkIRUVfgpZgJzFR6XiLUC/8TzUfxLD5f5J2ufXFc+VJBH0mX+b0FE8p4/M= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=code406.com; spf=pass smtp.mailfrom=code406.com; dkim=pass (1024-bit key) header.d=code406.com header.i=@code406.com header.b=LEqfPkgC; arc=none smtp.client-ip=74.125.82.181 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=code406.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=code406.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=code406.com header.i=@code406.com header.b="LEqfPkgC" Received: by mail-dy1-f181.google.com with SMTP id 5a478bee46e88-2d78e5d275aso1127108eec.0 for ; Sat, 11 Apr 2026 13:12:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=code406.com; s=google; t=1775938338; x=1776543138; darn=vger.kernel.org; h=cc:to:message-id:content-transfer-encoding:mime-version:subject :date:from:from:to:cc:subject:date:message-id:reply-to; bh=DTeoisoiiauq+nU3eIYTKPhuzuwv2vdodHFeSvzRcgI=; b=LEqfPkgCtQRfGEXQcFuBMZivIMvEF8HdZn8xmJZtm1e1W9xCDcrQBZ8lfDyaiQhgqP ileunZNC08wqYXONZgEZORyHZ5CeVAIEpWcUqm70VfkYajsAp6MlV6C55II4hMJv3jJE WwW0rOhPDJ3kgvhwpjNvsY+5oOA2B2PBK8gPk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1775938338; x=1776543138; h=cc:to:message-id:content-transfer-encoding:mime-version:subject :date:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=DTeoisoiiauq+nU3eIYTKPhuzuwv2vdodHFeSvzRcgI=; b=Dx2aicqJ1/E7Do3oXtuZooF6q326ygpVfbkubkBYbtoTq7IMaV/Frdg5miMZPMLLAt eqnRSURMGHROgBcrxavadPUQZYe5mpOR8KiSW7cPBOSatKyCeT877A8AkJjoLbod6kqA iBK9QObHq7oi61J77X3mtdlDM5LBS0xqb+VNbrzVJAsF4wQPbQ2bEojNEQ7g/atA/q08 DMzPYrvpYOs8Lk2DYSnZlYY4Lcn2clCqNKrP7pjYpcSuzOl5+qevQooI79DnptQfWMaY 9EdbUkK0TmLM4tKE9QfT/qKu33NdvVWMildFCRsaLWQaFXHmoFRZbm5/f0Q1ZZYQgmp/ A4dg== X-Gm-Message-State: AOJu0Yxzkd8rmS1tJGqrQC9XrhGM1pwWph8iSIbQQKWusT+bx0XEfY8M Ael9HnNrojYQuAGd4o7p4SE4bJXnuKUOFeXI+A8RfkD4IdFrnhfVAMXXZthHGLtigg== X-Gm-Gg: AeBDiet8yIcE4rCQVJz5FsxgFWaQXt8rAAyW3FGzh6v05XgeYHTC21MbXL03XpHWqf8 dS2lIyq2fba95mVqMNWGCTogBHDPXFNLyJI8z1ewWNP5Tq29LUu3XnMtWBhWEfyP+zREQUukix0 FemMESGz0tahlDI1GwB2Dz6ZgEpT6kkT2Yk+DrE18nV2k7g+rkVV1Fdk9u6Du6IetUetioOdAAI rArb3UlzMvSJCQxhko6nCuZoHWnT5DSYNr/h5juEhmN7h9ljhGJ1C4jNUmI5tl7QhQRlSD7M5w+ ebrajPVbl6ETtlhNCF21gJcP/23LKPqX1nVG0hpKaSDz+se0Eu3cuOcj2ILV/Y8kpgDMPzOgZXT O5b/RhiSTsWsXsIZJ0qgAecNf+Yl4X8eshX7dzti6FShxSrHH7slZyk0X0ugWN3kODnci8FbO7v 1xxAeujH//Pm+mFxQD+iak4eM/j5n5pzpsgr+B1LjlXrUHuAl7sUK40zqtAUao+I0QtXiAwOT5/ HLo0JXwaVFtVLHYpX6TlDOeWVaA57yflg== X-Received: by 2002:a05:7301:1e91:b0:2c8:7172:3b7b with SMTP id 5a478bee46e88-2d5881ace9amr5276521eec.18.1775938337531; Sat, 11 Apr 2026 13:12:17 -0700 (PDT) Received: from localhost ([2601:645:8a00:6e44:21b5:a2d0:e6aa:2a9a]) by smtp.gmail.com with ESMTPSA id 5a478bee46e88-2d80b1ab811sm981968eec.17.2026.04.11.13.12.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 11 Apr 2026 13:12:17 -0700 (PDT) From: Josh Snyder Date: Sat, 11 Apr 2026 13:12:07 -0700 Subject: [PATCH] trusted-keys: move pr_fmt out of trusted-type.h Precedence: bulk X-Mailing-List: linux-integrity@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Message-Id: <20260411-trusted-key-header-v1-1-407c2cd954db@code406.com> X-B4-Tracking: v=1; b=H4sIABar2mkC/yXMQQrCQAxG4auUrA10hijoVcTF2Plro1AlmUpL6 d0ddfkt3lvJYQqnU7OS4a2uz7Ei7BrqhjTewJqrKbbx0EoIXGzygswPLDwgZRinvUiSPsgxR6r hy9Dr/JueL3/7dL2jK98TbdsHR5oq33YAAAA= X-Change-ID: 20260411-trusted-key-header-a544a4f149d2 To: James Bottomley , Jarkko Sakkinen , Mimi Zohar , David Howells , Ahmad Fatoum , Pengutronix Kernel Team , Paul Moore , James Morris , "Serge E. Hallyn" , David Gstir , sigma star Kernel Team , Srish Srinivasan , Nayna Jain , Sumit Garg Cc: linux-integrity@vger.kernel.org, keyrings@vger.kernel.org, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, Josh Snyder X-Mailer: b4 0.15.1 X-Developer-Signature: v=1; a=ed25519-sha256; t=1775938336; l=4520; i=josh@code406.com; s=20260402; h=from:subject:message-id; bh=0zKbvspdxhnZRPxYXPH+dPdWs7eab1kfHTzyuRZUC6w=; b=8ME3VvZlnGV3qfIXrxUIyhjayTPM52XaGbk0ulcHhGoB+hs5C4gmQaQPldN9RNU+sp9dyjEGl xaR52USeUkuB8Vacb0TweRQMH/Eh4Q1e7IlZ7a23TjsEQV7UTgWXbLZ X-Developer-Key: i=josh@code406.com; a=ed25519; pk=J60jemVD5rPt9HnGvw/AAQ6RPciMTW8aAgWykCCnCXg= Defining pr_fmt in a widely-included header leaks the "trusted_key: " prefix into every translation unit that transitively includes . dm-crypt, for example, ends up printing trusted_key: device-mapper: crypt: dm-10: INTEGRITY AEAD ERROR ... dm-crypt began including in commit 363880c4eb36 ("dm crypt: support using trusted keys"), which predates the pr_fmt addition, so the regression has been live from the moment the header gained its own pr_fmt definition. Move the pr_fmt definition into the trusted-keys source files that actually want the prefix. Fixes: 5d0682be3189 ("KEYS: trusted: Add generic trusted keys framework") Assisted-by: Claude:claude-opus-4-6 Signed-off-by: Josh Snyder --- include/keys/trusted-type.h | 6 ------ security/keys/trusted-keys/trusted_caam.c | 2 ++ security/keys/trusted-keys/trusted_core.c | 2 ++ security/keys/trusted-keys/trusted_dcp.c | 2 ++ security/keys/trusted-keys/trusted_pkwm.c | 2 ++ security/keys/trusted-keys/trusted_tpm1.c | 2 ++ security/keys/trusted-keys/trusted_tpm2.c | 2 ++ 7 files changed, 12 insertions(+), 6 deletions(-) diff --git a/include/keys/trusted-type.h b/include/keys/trusted-type.h index 03527162613f7..54da1f174aeab 100644 --- a/include/keys/trusted-type.h +++ b/include/keys/trusted-type.h @@ -11,12 +11,6 @@ #include #include -#ifdef pr_fmt -#undef pr_fmt -#endif - -#define pr_fmt(fmt) "trusted_key: " fmt - #define MIN_KEY_SIZE 32 #define MAX_KEY_SIZE 128 #if IS_ENABLED(CONFIG_TRUSTED_KEYS_PKWM) diff --git a/security/keys/trusted-keys/trusted_caam.c b/security/keys/trusted-keys/trusted_caam.c index 601943ce0d60f..a31fd89c0e5c5 100644 --- a/security/keys/trusted-keys/trusted_caam.c +++ b/security/keys/trusted-keys/trusted_caam.c @@ -4,6 +4,8 @@ * Copyright 2025 NXP */ +#define pr_fmt(fmt) "trusted_key: " fmt + #include #include #include diff --git a/security/keys/trusted-keys/trusted_core.c b/security/keys/trusted-keys/trusted_core.c index 0b142d941cd2e..159af9dcfc774 100644 --- a/security/keys/trusted-keys/trusted_core.c +++ b/security/keys/trusted-keys/trusted_core.c @@ -6,6 +6,8 @@ * See Documentation/security/keys/trusted-encrypted.rst */ +#define pr_fmt(fmt) "trusted_key: " fmt + #include #include #include diff --git a/security/keys/trusted-keys/trusted_dcp.c b/security/keys/trusted-keys/trusted_dcp.c index 7b6eb655df0cb..f15ec400848ce 100644 --- a/security/keys/trusted-keys/trusted_dcp.c +++ b/security/keys/trusted-keys/trusted_dcp.c @@ -3,6 +3,8 @@ * Copyright (C) 2021 sigma star gmbh */ +#define pr_fmt(fmt) "trusted_key: " fmt + #include #include #include diff --git a/security/keys/trusted-keys/trusted_pkwm.c b/security/keys/trusted-keys/trusted_pkwm.c index bf42c6679245a..94c92b90d88da 100644 --- a/security/keys/trusted-keys/trusted_pkwm.c +++ b/security/keys/trusted-keys/trusted_pkwm.c @@ -3,6 +3,8 @@ * Copyright (C) 2025 IBM Corporation, Srish Srinivasan */ +#define pr_fmt(fmt) "trusted_key: " fmt + #include #include #include diff --git a/security/keys/trusted-keys/trusted_tpm1.c b/security/keys/trusted-keys/trusted_tpm1.c index 6ea728f1eae6f..69dac20e4bf23 100644 --- a/security/keys/trusted-keys/trusted_tpm1.c +++ b/security/keys/trusted-keys/trusted_tpm1.c @@ -6,6 +6,8 @@ * See Documentation/security/keys/trusted-encrypted.rst */ +#define pr_fmt(fmt) "trusted_key: " fmt + #include #include #include diff --git a/security/keys/trusted-keys/trusted_tpm2.c b/security/keys/trusted-keys/trusted_tpm2.c index 6340823f8b53c..f47ae952a0e7c 100644 --- a/security/keys/trusted-keys/trusted_tpm2.c +++ b/security/keys/trusted-keys/trusted_tpm2.c @@ -4,6 +4,8 @@ * Copyright (C) 2014 Intel Corporation */ +#define pr_fmt(fmt) "trusted_key: " fmt + #include #include #include --- base-commit: cc13002a9f984d37906e9476f3e532a8cdd126f5 change-id: 20260411-trusted-key-header-a544a4f149d2 Best regards, -- Josh