Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp2161516rwb; Sat, 24 Sep 2022 04:09:32 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4/qdbaA9aSBmoCi7Nlsqql9EgvtlJY+AHsqBHzrb1oAjhrR2ht7V5e0TGONvT4c91zyOLk X-Received: by 2002:a63:8843:0:b0:439:3c8e:c2c0 with SMTP id l64-20020a638843000000b004393c8ec2c0mr11576551pgd.404.1664017771976; Sat, 24 Sep 2022 04:09:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664017771; cv=none; d=google.com; s=arc-20160816; b=CVP+ptNOyEziEtyLxCz4LRoTCvyHVgn6eONOtElNtMl3hn6iLnY8J74xfN9r1sAD1c kuNlTKXSczNMflCbzJ/wxVFy9UJUPW746xr5dNd54I3/w2zaXxETP4r6JZwYPQ+JK+qj 9K6GOHLKVMSNJ/b8zH9iwzry/CJnmH3uz+/x0rEAu1SI9vDifsD3Z7GnBuAC2m6yyLlP GMlN6RcHgPLFDQK+wNJq3Zb41Zc5X7UN2Vxi1Qjaot1AMsjvvELcA0FjiOgg1gltox/Q u3qqk9MPKVOY+ZkZpy94ZMFuaDKMFAYp12A+qUQoLS/6q3TS4N/KkPP6ecDA/RbEOfNH FvPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=ZEWU/SZjZLU0pKU4NYqMI/Q1wysz3WsVdME1WrbtI3A=; b=aobA+r1sZNARGBJ02Pw446xJPMo1FkDmaIrK4tbUAeAXYnaVVWTi3J1FW5DYkpJ7dp irsLstOvMjWuRBFkN+cIzXVYLQyoJ8Okl+XNtr7yzgTcz2y5u3y2rGdIpauC79C5aPtK eUDTzGC/7kGSZQ3T8kMIHunv02yk6xcyZPezv/CZPbm+FowD36HRozhh1t5QOiMNOxsi EjOTU4WVHmBx8O+EGRhuExTi1mfDAxmZSwCRyuirj8PgHvyXKQPU/Uk61YPaL5Jrk8zd hJnliA5VLwGp9UCiEolb0Be5GeVtVx+S6YG50ObBHKhgdSIG3Xs+9ZmnAV1pL7LxXghx iboQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0Tw9HH0a; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x190-20020a6386c7000000b0043447482f6fsi11945964pgd.0.2022.09.24.04.09.19; Sat, 24 Sep 2022 04:09:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0Tw9HH0a; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231218AbiIXKNv (ORCPT + 99 others); Sat, 24 Sep 2022 06:13:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53352 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233850AbiIXKNm (ORCPT ); Sat, 24 Sep 2022 06:13:42 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BB80E12889E; Sat, 24 Sep 2022 03:13:39 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 4ECC1B80DC8; Sat, 24 Sep 2022 10:13:38 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 72082C433D6; Sat, 24 Sep 2022 10:13:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1664014417; bh=2RR7JCSle62Ctd7cdprNFNuNTmoMwLRSHoPcjFErasY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=0Tw9HH0agvwO440m5y/HJwPfr43xzzV/VsRm39t4dsn1npdKjHy/MWDuw98bFO7By GjNvO3dj6iZIKCfpff0NcgYBbtzrc/OrVikuPqjLdFZ1nHLbmg7Gc2kzRXsGwJH9m9 O6xsyQEpCNlaEC3jkmNwX42igf+xwaYVyoGMYcLw= Date: Sat, 24 Sep 2022 12:13:34 +0200 From: Greg Kroah-Hartman To: Michal =?iso-8859-1?Q?Such=E1nek?= Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Alexander Gordeev , Sven Schnelle , Philipp Rudo , Sasha Levin , Baoquan He , Alexander Egorenkov , "open list:S390" , Catalin Marinas , Will Deacon , Michael Ellerman , Benjamin Herrenschmidt , Paul Mackerras , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)" , "H. Peter Anvin" , Eric Biederman , Mimi Zohar , "Naveen N. Rao" , Andrew Morton , "moderated list:ARM64 PORT (AARCH64 ARCHITECTURE)" , "open list:LINUX FOR POWERPC (32-BIT AND 64-BIT)" , "open list:KEXEC" , Coiby Xu , keyrings@vger.kernel.org, linux-security-module@vger.kernel.org, James Morse , AKASHI Takahiro Subject: Re: [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies Message-ID: References: <20220924094521.GY28810@kitsune.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20220924094521.GY28810@kitsune.suse.cz> X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Sep 24, 2022 at 11:45:21AM +0200, Michal Such?nek wrote: > On Sat, Sep 24, 2022 at 11:19:19AM +0200, Greg Kroah-Hartman wrote: > > On Fri, Sep 23, 2022 at 07:10:28PM +0200, Michal Suchanek wrote: > > > Hello, > > > > > > this is backport of commit 0d519cadf751 > > > ("arm64: kexec_file: use more system keyrings to verify kernel image signature") > > > to table 5.15 tree including the preparatory patches. > > > > This feels to me like a new feature for arm64, one that has never worked > > before and you are just making it feature-parity with x86, right? > > > > Or is this a regression fix somewhere? Why is this needed in 5.15.y and > > why can't people who need this new feature just use a newer kernel > > version (5.19?) > > It's half-broken implementation of the kexec kernel verification. At the time > it was implemented for arm64 we had the platform and secondary keyrings > and x86 was using them but on arm64 the initial implementation ignores > them. Ok, so it's something that never worked. Adding support to get it to work doesn't really fall into the stable kernel rules, right? Again, what's wrong with 5.19 for anyone who wants this? Who does want this? thanks, greg k-h