Received: by 10.192.165.148 with SMTP id m20csp261245imm; Tue, 24 Apr 2018 22:01:57 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/ss+XIplU6ztX3P6lC0YECxZw5vgQoYrUrepPGVteyJAId57aKNPpOp357rpRvuXS1QWc4 X-Received: by 2002:a17:902:22a:: with SMTP id 39-v6mr27989808plc.128.1524632517694; Tue, 24 Apr 2018 22:01:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524632517; cv=none; d=google.com; s=arc-20160816; b=v0sbv0rnTR6itKrgzW6DdTCVks/CN89YUSyUeMJ9NLRtzauvYFBuUygSAMXPQ/PKKc w8xff5F/fqyDeD7OiehH4waEqyamqo0TsFN1ANpcqFoDOgkOzbiLvFRyF3PN2qdJoZi2 T6fMhY5Jw38z33anerma6+2hIUlRuqwBtc8NU6IBxBgkBFFhRRZHEj6fFFtWB++PGCs6 xrTTntRQOq1Cl7abADKR5xW5nklEYMh6MHlnfUCe5VP3xKYdCVOngddnhN8vyhFDdary IkAj8PfLf+Oge59FRDh6aqYxCn+iNL5wlTX4IG2kgzSvLUiIWyLBJ5bQtAz+GZUE0/L9 QrUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :mime-version:references:in-reply-to:date:cc:to:from:subject :arc-authentication-results; bh=/d4MvYTztGpFdAwHR22Au8pYS/pPN5MLOBWzAOCWE+4=; b=PAhG6DqjLjRvRzD/ov2tktvs9PE34AWMDx+jU2YT8/y5nTxKSoswACgpisKKKRiJmu zskqx++yzRhMXFVl3kQKrLSYk23/iRoKua55Er6z1eGnewP+JYCMLgVMgSxZifXE7Y35 Ct4nBLrIa43KCXHz1D3SPxuAoaoWIIEClKr+y8OjWOz0h50OHKVbzItrHGUlTl9HKiQz MJf2tkvf60ujExD8gUjjst95CHfF+gB/WmudAtM9SCFFu9esZgZ154mDhHhaFj/ZJrKG K4xNP36iVrXdMAzcc1mJ5Xhn/v/nkENUoy4OpP9NFP/NxtnkgzXmH6/rLJftPE5RjnY1 l9Dw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d9-v6si1751971plj.573.2018.04.24.22.01.42; Tue, 24 Apr 2018 22:01:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751241AbeDYFAe (ORCPT + 99 others); Wed, 25 Apr 2018 01:00:34 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:41252 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750807AbeDYFAb (ORCPT ); Wed, 25 Apr 2018 01:00:31 -0400 Received: from pps.filterd (m0098394.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w3P4xMap103157 for ; Wed, 25 Apr 2018 01:00:30 -0400 Received: from e06smtp14.uk.ibm.com (e06smtp14.uk.ibm.com [195.75.94.110]) by mx0a-001b2d01.pphosted.com with ESMTP id 2hjd6acdhq-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 25 Apr 2018 01:00:30 -0400 Received: from localhost by e06smtp14.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 25 Apr 2018 06:00:26 +0100 Received: from b06cxnps4075.portsmouth.uk.ibm.com (9.149.109.197) by e06smtp14.uk.ibm.com (192.168.101.144) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Wed, 25 Apr 2018 06:00:17 +0100 Received: from d06av22.portsmouth.uk.ibm.com (d06av22.portsmouth.uk.ibm.com [9.149.105.58]) by b06cxnps4075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w3P50G6k25297070; Wed, 25 Apr 2018 05:00:16 GMT Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 11C534C071; Wed, 25 Apr 2018 05:52:37 +0100 (BST) Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id DA6934C05C; Wed, 25 Apr 2018 05:52:30 +0100 (BST) Received: from localhost.localdomain (unknown [9.80.105.189]) by d06av22.portsmouth.uk.ibm.com (Postfix) with ESMTP; Wed, 25 Apr 2018 05:52:30 +0100 (BST) Subject: Re: [PATCH v3 2/5] efi: Add embedded peripheral firmware support From: Mimi Zohar To: "Luis R. Rodriguez" , Andrew Morton , linux-security-module@vger.kernel.org, Chris Wright , David Howells , Alan Cox , Kees Cook Cc: Hans de Goede , Darren Hart , Andy Shevchenko , Ard Biesheuvel , Greg Kroah-Hartman , Thomas Gleixner , Ingo Molnar , "H . Peter Anvin" , platform-driver-x86@vger.kernel.org, linux-kernel@vger.kernel.org, Peter Jones , Dave Olsthoorn , Will Deacon , Andy Lutomirski , Matt Fleming , Josh Triplett , dmitry.torokhov@gmail.com, mfuzzey@parkeon.com, Kalle Valo , Arend Van Spriel , Linus Torvalds , nbroeking@me.com, bjorn.andersson@linaro.org, Torsten Duwe , x86@kernel.org, linux-efi Date: Wed, 25 Apr 2018 01:00:09 -0400 In-Reply-To: <20180424234219.GX14440@wotan.suse.de> References: <20180408174014.21908-1-hdegoede@redhat.com> <20180408174014.21908-3-hdegoede@redhat.com> <20180423211143.GZ14440@wotan.suse.de> <71e6a45a-398d-b7a4-dab0-8b9936683226@redhat.com> <1524586021.3364.20.camel@linux.vnet.ibm.com> <20180424234219.GX14440@wotan.suse.de> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 (3.20.5-1.fc24) Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 18042505-0044-0000-0000-0000054BC975 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18042505-0045-0000-0000-0000288C03A8 Message-Id: <1524632409.3371.48.camel@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-04-25_01:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1804250043 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2018-04-24 at 23:42 +0000, Luis R. Rodriguez wrote: > On Tue, Apr 24, 2018 at 12:07:01PM -0400, Mimi Zohar wrote: > > On Tue, 2018-04-24 at 17:09 +0200, Hans de Goede wrote: > > > Hi, > > > > > > On 23-04-18 23:11, Luis R. Rodriguez wrote: > > > > Hans, please see use of READING_FIRMWARE_PREALLOC_BUFFER, we'll need a new ID > > > > and security for this type of request so IMA can reject it if the policy is > > > > configured for it. > > > > > > Hmm, interesting, actually it seems like the whole existence > > > of READING_FIRMWARE_PREALLOC_BUFFER is a mistake, > > request_firmware_into_buf() was merged without my own review, however, > the ID thing did get review from Mimi: > > https://patchwork.kernel.org/patch/9074611/ > > The ID is not for IMA alone, its for any LSM to decide what to do. > Note Mimi asked for READING_FIRMWARE_DMA if such buffer was in DMA, > otherise READING_FIRMWARE_PREALLOC_BUFFER was suggested. > > > > the IMA > > > framework really does not care if we are loading the firmware > > > into memory allocated by the firmware-loader code, or into > > > memory allocated by the device-driver requesting the firmware. > > That's up to LSM folks to decide. We have these so far: > > #define __kernel_read_file_id(id) \ > id(UNKNOWN, unknown) \ > id(FIRMWARE, firmware) \ > id(FIRMWARE_PREALLOC_BUFFER, firmware) \ > id(MODULE, kernel-module) \ > id(KEXEC_IMAGE, kexec-image) \ > id(KEXEC_INITRAMFS, kexec-initramfs) \ > id(POLICY, security-policy) \ > id(X509_CERTIFICATE, x509-certificate) \ > id(MAX_ID, ) > > The first type of IDs added was about type of files the kernel > LSMs may want to do different things for. > > Mimi why did you want a separate ID for it back before? The point of commit a098ecd2fa7d ("firmware: support loading into a pre-allocated buffer") is to avoid reading the firmware into kernel memory and then copying it "to it's final resting place".  My concern is that if the device driver has access to the buffer, it could access the buffer prior to the firmware's signature having been verified by the kernel. In tightly controlled environments interested in limiting which signed firmware version is loaded, require's the device driver not having access to the buffer until after the signature has been verified by the kernel (eg. IMA-appraisal). > > I should note now that request_firmware_into_buf() and its > READING_FIRMWARE_PREALLOC_BUFFER was to enable a driver on memory constrained > devices. The files are large (commit says 16 MiB). > > I've heard of larger possible files with remoteproc and with Android using > the custom fallback mechanism -- which could mean a proprietary tool > fetching firmware from a random special place on a device. > > I could perhaps imagine an LSM which may be aware of such type of > arrangement may want to do its own vetting of some sort, but this > would not be specific to READING_FIRMWARE_PREALLOC_BUFFER, but rather > the custom fallback mechaism. > > Whether or not the buffer was preallocated by the driver seems a little > odd for security folks to do something different with it. Security LSM > folks please chime in. > > I could see a bit more of a use case for an ID for firmware scraped > from EFI, which Hans' patch will provide. But that *also* should get > good review from other LSM folks. > > One of the issues with accepting more IDs loosely is where do we > stop though? If no one really is using READING_FIRMWARE_PREALLOC_BUFFER > I'd say lets remove it. Likewise, for this EFI thing I'd like an idea > if we really are going to have users for it. > > If its of any help -- > > drivers/soc/qcom/mdt_loader.c is the only driver currently using > request_firmware_into_buf() however I'll note qcom_mdt_load() is used in many > other drivers so they are wrappers around request_firmware_into_buf(): > > drivers/gpu/drm/msm/adreno/a5xx_gpu.c: * adreno_request_fw() handles this, but qcom_mdt_load() does > drivers/gpu/drm/msm/adreno/a5xx_gpu.c: ret = qcom_mdt_load(dev, fw, fwname, GPU_PAS_ID, > drivers/gpu/drm/msm/adreno/a5xx_gpu.c: ret = qcom_mdt_load(dev, fw, newname, GPU_PAS_ID, > drivers/media/platform/qcom/venus/firmware.c: ret = qcom_mdt_load(dev, mdt, fwname, VENUS_PAS_ID, mem_va, mem_phys, > drivers/remoteproc/qcom_adsp_pil.c: return qcom_mdt_load(adsp->dev, fw, rproc->firmware, adsp->pas_id, > drivers/remoteproc/qcom_wcnss.c: return qcom_mdt_load(wcnss->dev, fw, rproc->firmware, WCNSS_PAS_ID, > > Are we going to add more IDs for more types of firmware? > What type of *different* decisions could LSMs take if the firmware > was being written to a buffer? Or in this new case that is coming > up, if the file came scraping EFI, would having that information > be useful? > > > > As such the current IMA code (from v4.17-rc2) actually does > > > not handle READING_FIRMWARE_PREALLOC_BUFFER at all, > > > > Right, it doesn't yet address READING_FIRMWARE_PREALLOC_BUFFER, but > > should. > > > > Depending on whether the device requesting the firmware has access to > > the DMA memory, before the signature verification, > > It would seem from the original patch review about READING_FIRMWARE_PREALLOC_BUFFER > that this is not a DMA buffer. The call sequence: qcom_mdt_load() -> qcom_scm_pas_init_image() -> dma_alloc_coherent() If dma_alloc_coherent() isn't allocating a DMA buffer, then the function name is misleading/confusing. > > The device driver should have access to the buffer pointer with write given > that with request_firmware_into_buf() the driver is giving full write access to > the memory pointer so that the firmware API can stuff the firmware it finds > there. > > Firmware signature verification would be up to the device hardware to do upon > load *after* request_firmware_into_buf(). We're discussing the kernel's signature verification, not the device hardware's signature verification.  Can the device driver access the buffer, before IMA-appraisal has verified the firmware's signature? Mimi > > Luis > > > will determine how > > IMA-appraisal addresses READING_FIRMWARE_PREALLOC_BUFFER. > > > > Mimi > > > > > here > > > are bits of code from: security/integrity/ima/ima_main.c: > > > > > > static int read_idmap[READING_MAX_ID] = { > > > [READING_FIRMWARE] = FIRMWARE_CHECK, > > > [READING_MODULE] = MODULE_CHECK, > > > [READING_KEXEC_IMAGE] = KEXEC_KERNEL_CHECK, > > > [READING_KEXEC_INITRAMFS] = KEXEC_INITRAMFS_CHECK, > > > [READING_POLICY] = POLICY_CHECK > > > }; > > > > > > int ima_post_read_file(struct file *file, void *buf, loff_t size, > > > ... > > > if (!file && read_id == READING_FIRMWARE) { > > > if ((ima_appraise & IMA_APPRAISE_FIRMWARE) && > > > (ima_appraise & IMA_APPRAISE_ENFORCE)) > > > return -EACCES; /* INTEGRITY_UNKNOWN */ > > > return 0; > > > } > > > > > > Which show that the IMA code is not handling > > > READING_FIRMWARE_PREALLOC_BUFFER as it should (I believe it > > > should handle it the same as READING_FIRMWARE). > > > > > > Now we could fix that, but the only user of > > > READING_FIRMWARE_PREALLOC_BUFFER is the code which originally > > > introduced it: > > > > > > https://patchwork.kernel.org/patch/9162011/ > > > > > > So I believe it might be better to instead replace it > > > with just READING_FIRMWARE and find another way to tell > > > kernel_read_file() that there is a pre-allocated buffer, > > > perhaps the easiest way there is that *buf must be > > > NULL when the caller wants kernel_read_file() to > > > vmalloc the mem. This would of course require auditing > > > all callers that the buf which the pass in is initialized > > > to NULL. > > > > > > Either way adding a third READING_FIRMWARE_FOO to the > > > kernel_read_file_id enum seems like a bad idea, from > > > the IMA pov firmware is firmware. > > > > > > What this whole exercise has shown me though is that > > > I need to call security_kernel_post_read_file() when > > > loading EFI embedded firmware. I will add a call to > > > security_kernel_post_read_file() for v4 of the patch-set. > > > > > > > Please Cc Kees in future patches. > > > > > > Will do. > > > > > > Regards, > > > > > > Hans > > > > > > > >