From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 90E06C07E9D for ; Sat, 24 Sep 2022 10:15:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References: Message-ID:Subject:Cc:To:From:Date:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=GmAXl05SfFHE2Rz/qspjli1CdfcBWWvvK2Xhei6fp38=; b=nFFc7qE3NXeQh8 9wlYSTZQDnfzyspwj7UkNa5sB1mKNtDvSUFwzcISILpSDEENTfJxJHCqGVd+pycV0idu//mOjCS+r 4bgqHDfCFgCQpdnCJV4KJ3DmBZtHEZvLQbWi6qOJkaDh/HcV7MZErfI0kC0c6Q26yV9266BIvsxOl ySXihYvpiPO6F85POT3T4zWr+kOLQ4bwA9rjBlt02wpbcCEjNmnpSmweFX+lPis/Q3sbFmkoW+lWO BUXR5hidTD6oW4vhiMuC9IJy1CgGnqFwFQXa4MPcAxp1W4HgQluXanlpUxjq4bKucsvZYpVJDf1Qj +vIMMuu+Ozt+kE2p4UYQ==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1oc2AK-006s2t-SK; Sat, 24 Sep 2022 10:13:44 +0000 Received: from ams.source.kernel.org ([2604:1380:4601:e00::1]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1oc2AG-006s1q-U4; Sat, 24 Sep 2022 10:13:42 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 475A7B8087F; Sat, 24 Sep 2022 10:13:38 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 72082C433D6; Sat, 24 Sep 2022 10:13:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1664014417; bh=2RR7JCSle62Ctd7cdprNFNuNTmoMwLRSHoPcjFErasY=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=0Tw9HH0agvwO440m5y/HJwPfr43xzzV/VsRm39t4dsn1npdKjHy/MWDuw98bFO7By GjNvO3dj6iZIKCfpff0NcgYBbtzrc/OrVikuPqjLdFZ1nHLbmg7Gc2kzRXsGwJH9m9 O6xsyQEpCNlaEC3jkmNwX42igf+xwaYVyoGMYcLw= Date: Sat, 24 Sep 2022 12:13:34 +0200 From: Greg Kroah-Hartman To: Michal =?iso-8859-1?Q?Such=E1nek?= Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Heiko Carstens , Vasily Gorbik , Christian Borntraeger , Alexander Gordeev , Sven Schnelle , Philipp Rudo , Sasha Levin , Baoquan He , Alexander Egorenkov , "open list:S390" , Catalin Marinas , Will Deacon , Michael Ellerman , Benjamin Herrenschmidt , Paul Mackerras , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)" , "H. Peter Anvin" , Eric Biederman , Mimi Zohar , "Naveen N. Rao" , Andrew Morton , "moderated list:ARM64 PORT (AARCH64 ARCHITECTURE)" , "open list:LINUX FOR POWERPC (32-BIT AND 64-BIT)" , "open list:KEXEC" , Coiby Xu , keyrings@vger.kernel.org, linux-security-module@vger.kernel.org, James Morse , AKASHI Takahiro Subject: Re: [PATCH 5.15 0/6] arm64: kexec_file: use more system keyrings to verify kernel image signature + dependencies Message-ID: References: <20220924094521.GY28810@kitsune.suse.cz> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <20220924094521.GY28810@kitsune.suse.cz> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220924_031341_289360_F6269A6B X-CRM114-Status: GOOD ( 20.41 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Sat, Sep 24, 2022 at 11:45:21AM +0200, Michal Such=E1nek wrote: > On Sat, Sep 24, 2022 at 11:19:19AM +0200, Greg Kroah-Hartman wrote: > > On Fri, Sep 23, 2022 at 07:10:28PM +0200, Michal Suchanek wrote: > > > Hello, > > > = > > > this is backport of commit 0d519cadf751 > > > ("arm64: kexec_file: use more system keyrings to verify kernel image = signature") > > > to table 5.15 tree including the preparatory patches. > > = > > This feels to me like a new feature for arm64, one that has never worked > > before and you are just making it feature-parity with x86, right? > > = > > Or is this a regression fix somewhere? Why is this needed in 5.15.y and > > why can't people who need this new feature just use a newer kernel > > version (5.19?) > = > It's half-broken implementation of the kexec kernel verification. At the = time > it was implemented for arm64 we had the platform and secondary keyrings > and x86 was using them but on arm64 the initial implementation ignores > them. Ok, so it's something that never worked. Adding support to get it to work doesn't really fall into the stable kernel rules, right? Again, what's wrong with 5.19 for anyone who wants this? Who does want this? thanks, greg k-h _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel