Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp2094011rwb; Sat, 24 Sep 2022 02:53:27 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4cW0q3s8CZ5ClMhf65bXnVgPExIXperIjSM9GmRB0pKCu90cwG9hsbF2dFFUfFqyMlL+HP X-Received: by 2002:a17:907:7fa5:b0:781:4add:3a21 with SMTP id qk37-20020a1709077fa500b007814add3a21mr10660890ejc.267.1664013206848; Sat, 24 Sep 2022 02:53:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664013206; cv=none; d=google.com; s=arc-20160816; b=jZ/K3f2tbHNgwuKu55GUOADQY0fKaISY7Ngd1GeIEoeLgTqDAsHNugVMvwPySfOuix AJ367f2jq5twmPSCroYK1OxMgcoKLzweN/K7A1+yLk6O3L4IFQgOoRNJ2fJJEcTKZiz0 gN2KWo3pGfb0bNrurj0wAz/1CDIpIoMyeW1T3FQtR12sp7c6m1LoH5ZHsA5aeiz3ttvk tIdAJDJmUNjos8P2gwo3KROo2TGK2BNqY/7KtITt6J7cwNrgIRuiQ5j1cohku6y2SgF6 VG5hyq4hWHziIlTKKVEBGUXDvuH2gYLChgeeUJtT4Yo8wNDwgE77AvtL2W2S0G8UavMe CYtw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature:dkim-signature; bh=X+31A8c9OfnUMfxPv1Vio1hLtPmcDuwGTIjcRm3tKEs=; b=Cfmx/j83otZr/C9pZkvXAeeIk2+ClHAOrY+FjzIqqFX9dMtt6UeRJW7dJ9nyKAfYVu zz+SsGjWD66LlM5VWUG+QlaVyQblt6O/VsbkcSVrSE82vKqsuK6ArXwuCppdkEmt59mt Qg9bwPSGNPbx02WJaTE1736O3jSQbl2QW9liJASsqRUn2f7TowuFUGQC4kgNqdPHQqNC npooffAe2wcfXFjWIvevlMypKDrMm/WOTIPTc8HheSGlo/3yXGIpHZWbmxpgZn1661rS KWTK2cWB7r06NSWDKTL1vaAhPG69ezkx8QYVklY9XLGaZYPvjJEMakPjsNmV9KV8CrZB hLCQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=P3Jq6HqO; dkim=neutral (no key) header.i=@suse.de header.b=KTkOyriF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gt11-20020a1709072d8b00b0077c2e4f3c39si12330122ejc.26.2022.09.24.02.53.00; Sat, 24 Sep 2022 02:53:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.de header.s=susede2_rsa header.b=P3Jq6HqO; dkim=neutral (no key) header.i=@suse.de header.b=KTkOyriF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=suse.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233658AbiIXJpg (ORCPT + 99 others); Sat, 24 Sep 2022 05:45:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45628 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230134AbiIXJpd (ORCPT ); Sat, 24 Sep 2022 05:45:33 -0400 Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B5ACE50532; Sat, 24 Sep 2022 02:45:30 -0700 (PDT) Received: from relay2.suse.de (relay2.suse.de [149.44.160.134]) by smtp-out2.suse.de (Postfix) with ESMTP id F35621F88E; Sat, 24 Sep 2022 09:45:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1664012729; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=X+31A8c9OfnUMfxPv1Vio1hLtPmcDuwGTIjcRm3tKEs=; b=P3Jq6HqOy5gS7m6FJDMINZyRR8CzuNUbJKkzyYtwRnM1R6DvQu2CQdR/Gu7CeEdmQQPJAw eikEp/i1ZBjrdwZ6P8CoMJZBKJIqkRRRCvTDJG/R09FprsSWTCkTi80jVyNXKlEHackQvb bvTZPj63OV+ovtHhsrQC4iiLXdkpCiU= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1664012729; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=X+31A8c9OfnUMfxPv1Vio1hLtPmcDuwGTIjcRm3tKEs=; b=KTkOyriFJKJx9Ejq1tpe5tI5kJSiUXMkJzZuFFrtte0p785wK6VotBiKdeVD1Tkp8h9r2k 0jOgM+O9oS7vA3Aw== Received: from kitsune.suse.cz (kitsune.suse.cz [10.100.12.127]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by relay2.suse.de (Postfix) with ESMTPS id E91CC2C166; Sat, 24 Sep 2022 09:45:22 +0000 (UTC) Date: Sat, 24 Sep 2022 11:45:21 +0200 From: Michal =?iso-8859-1?Q?Such=E1nek?= To: Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Alexander Gordeev , Sven Schnelle , Philipp Rudo , Sasha Levin , Baoquan He , Alexander Egorenkov , "open list:S390" , Catalin Marinas , Will Deacon , Michael Ellerman , Benjamin Herrenschmidt , Paul Mackerras , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)" , "H. Peter Anvin" , Eric Biederman , Mimi Zohar , "Naveen N. Rao" , Andrew Morton , "moderated list:ARM64 PORT (AARCH64 ARCHITECTURE)" , "open list:LINUX FOR POWERPC (32-BIT AND 64-BIT)" , "open list:KEXEC" , Coiby Xu , keyrings@vger.kernel.org, linux-security-module@vger.kernel.org, James Morse , AKASHI Takahiro Subject: Re: [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies Message-ID: <20220924094521.GY28810@kitsune.suse.cz> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Sep 24, 2022 at 11:19:19AM +0200, Greg Kroah-Hartman wrote: > On Fri, Sep 23, 2022 at 07:10:28PM +0200, Michal Suchanek wrote: > > Hello, > > > > this is backport of commit 0d519cadf751 > > ("arm64: kexec_file: use more system keyrings to verify kernel image signature") > > to table 5.15 tree including the preparatory patches. > > This feels to me like a new feature for arm64, one that has never worked > before and you are just making it feature-parity with x86, right? > > Or is this a regression fix somewhere? Why is this needed in 5.15.y and > why can't people who need this new feature just use a newer kernel > version (5.19?) It's half-broken implementation of the kexec kernel verification. At the time it was implemented for arm64 we had the platform and secondary keyrings and x86 was using them but on arm64 the initial implementation ignores them. Thanks Michal