Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp414493rwb; Mon, 26 Sep 2022 00:01:05 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7zYMOCe+llX8L9xk6DFVs3fK83CyxkwqRknkdhQMbHetZhfPpign9CBTA6vqKs9MrTTkvi X-Received: by 2002:a17:907:3f13:b0:782:1266:8c10 with SMTP id hq19-20020a1709073f1300b0078212668c10mr16950495ejc.197.1664175665061; Mon, 26 Sep 2022 00:01:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664175665; cv=none; d=google.com; s=arc-20160816; b=AcGxNXvMsSG+vIgxdd5jYwhAsR989haBYxElrrS46X4J/vBQ9c9EijtjlIxVY7zIx6 8xSVBA/axOGAqoqLDauQjIquWDKCkqArDxnCIHpp9VpHe9LIu1LjTGqhkwaA1Q5VhihK PWjW7C2XYn1hu37SpyGeogRU4VPD867XEpeGYKqmLZ333UxCYbFtaKfiIjdXWOCp6Jt0 IRjmVRlM/LE1OtUFzDUqS7yCld9WGuSHvin/cfSS80RjchXuTEVnyi0r0XyBLkMcnLi/ i53TZ+co/tRoSuT68J3RFKVwLm6fxUUM2B/OYWkaL/Ullp86QMAAh2NdQw04MgfWVN6m 7Vdw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=W5ow488P991Qd1xr2iLEq1VZsl96BskpEJ5efLvULGk=; b=zbV50UggiMVkVpcS5L08Kxsm50q1HYYieEdFWDbdOdLCMLMWnxz4zGIdce6gFHs5ns OS0pHWnNLhjBtx6dvV5Kro2RM1GKQq22bT5MiIkVLkhhLl3kNRyG97oBLAqK5PAKhKDV uDTU3VLLjVk+4Lurs6Xa3w59EQ268yos7ssmayVRsIGsO4ne60X00OeL6A6yK6Gr1HKl OO0+YZ4Vrs3+qAKcz5Zd7DkilrKytNslG8k5XKzphT85DDUm81H3yV+MhLyGRcCZ+Bhq SbyPX3A6lQZaU/4idPjdrXoa+Rl/HSzpJncSwfPY+9eRgR7kQRCPCrMmXjeZsrXHOW4T 9U9g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=R01HPFGg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d3-20020a170906640300b00780828d3399si14661627ejm.955.2022.09.26.00.00.39; Mon, 26 Sep 2022 00:01:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=R01HPFGg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233712AbiIZGrn (ORCPT + 99 others); Mon, 26 Sep 2022 02:47:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36558 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233274AbiIZGrg (ORCPT ); Mon, 26 Sep 2022 02:47:36 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BEF6224BE0; Sun, 25 Sep 2022 23:47:35 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 4FB5061503; Mon, 26 Sep 2022 06:47:35 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2D481C433D6; Mon, 26 Sep 2022 06:47:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1664174854; bh=Y2sNyycpz3WfUGxxxwkrxUxDfizPmjY1zyzAphv6PIM=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=R01HPFGgQkDQRVV6X/B85xXIWfuTBp4FYgiRlfvicfMadW+sS9Aa4uveH3JqL9r23 Ff6Sw3/AUKjIe4eR/Md3V2qY3UjWduTwexkEjHI2Udigby3+gkYfFqPtAt3lvzZ5yX uFPWzkAzYRCDL1i9yqqNN14LCX5p+qNGKO1nNU1M= Date: Mon, 26 Sep 2022 08:47:32 +0200 From: Greg Kroah-Hartman To: Michal =?iso-8859-1?Q?Such=E1nek?= Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Alexander Gordeev , Sven Schnelle , Philipp Rudo , Sasha Levin , Baoquan He , Alexander Egorenkov , "open list:S390" , Catalin Marinas , Will Deacon , Michael Ellerman , Benjamin Herrenschmidt , Paul Mackerras , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)" , "H. Peter Anvin" , Eric Biederman , Mimi Zohar , "Naveen N. Rao" , Andrew Morton , "moderated list:ARM64 PORT (AARCH64 ARCHITECTURE)" , "open list:LINUX FOR POWERPC (32-BIT AND 64-BIT)" , "open list:KEXEC" , Coiby Xu , keyrings@vger.kernel.org, linux-security-module@vger.kernel.org, James Morse , AKASHI Takahiro Subject: Re: [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies Message-ID: References: <20220924094521.GY28810@kitsune.suse.cz> <20220924115523.GZ28810@kitsune.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20220924115523.GZ28810@kitsune.suse.cz> X-Spam-Status: No, score=-7.2 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Sep 24, 2022 at 01:55:23PM +0200, Michal Such?nek wrote: > On Sat, Sep 24, 2022 at 12:13:34PM +0200, Greg Kroah-Hartman wrote: > > On Sat, Sep 24, 2022 at 11:45:21AM +0200, Michal Such?nek wrote: > > > On Sat, Sep 24, 2022 at 11:19:19AM +0200, Greg Kroah-Hartman wrote: > > > > On Fri, Sep 23, 2022 at 07:10:28PM +0200, Michal Suchanek wrote: > > > > > Hello, > > > > > > > > > > this is backport of commit 0d519cadf751 > > > > > ("arm64: kexec_file: use more system keyrings to verify kernel image signature") > > > > > to table 5.15 tree including the preparatory patches. > > > > > > > > This feels to me like a new feature for arm64, one that has never worked > > > > before and you are just making it feature-parity with x86, right? > > > > > > > > Or is this a regression fix somewhere? Why is this needed in 5.15.y and > > > > why can't people who need this new feature just use a newer kernel > > > > version (5.19?) > > > > > > It's half-broken implementation of the kexec kernel verification. At the time > > > it was implemented for arm64 we had the platform and secondary keyrings > > > and x86 was using them but on arm64 the initial implementation ignores > > > them. > > > > Ok, so it's something that never worked. Adding support to get it to > > work doesn't really fall into the stable kernel rules, right? > > Not sure. It was defective, not using the facilities available at the > time correctly. Which translates to kernels that can be kexec'd on x86 > failing to kexec on arm64 without any explanation (signed with same key, > built for the appropriate arch). Feature parity across architectures is not a "regression", but rather a "this feature is not implemented for this architecture yet" type of thing. > > Again, what's wrong with 5.19 for anyone who wants this? Who does want > > this? > > Not sure, really. > > The final patch was repeatedly backported to stable and failed to build > because the prerequisites were missing. That's because it was tagged, but now that you show the full set of requirements, it's pretty obvious to me that this is not relevant for going this far back. thanks, greg k-h