Received: by 10.192.165.148 with SMTP id m20csp158085imm; Thu, 3 May 2018 17:04:37 -0700 (PDT) X-Google-Smtp-Source: AB8JxZp9Vri+3T/9oHeHt0BLxBo0YY1AcdJwEbOJLVDi8MFTsLvyJW0hJ/GgeSGKk/Z22cvBSsCo X-Received: by 2002:a63:7c01:: with SMTP id x1-v6mr20624251pgc.286.1525392277444; Thu, 03 May 2018 17:04:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525392277; cv=none; d=google.com; s=arc-20160816; b=murjTve8LhidQ0xvBKeapamF7X4EmHu0xNazgCm8jefhOrYfxVLkvl56b1A4ydu+CP JB7kL1vjOzv+2tlV6Se+NcgW4bzJqnejkoQ9VSkiRfBGUOD7S+xndUuWNZ8ZJNrP1Lg9 YDk7dPtONw7IyUT3AToBiY0Pdzm/uUGgB58afCkNmyPZZkRE+L8aWJmkUrhJfWn4axb0 nB270Z3rgaMxMA0gNYOC/TpgImqp5mKucuK2SwAn1Oglwz56/Z8TPCSY+VRBbVuojjSE AAXPGEsPLR1n3Hg3nMpSGUgHW/QfJ2jDjpkwaX9Ew2giYMvV6s0z4xg2x9+mwohxxrTD VTlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=/utSPfZlDEIDFTCl6SmSb8XB+JsfkA7aOK8bRMTT4SM=; b=zoWx3dH4eN0PUsRxmsKt9BfWpVD3SYgsy8X6PNvVuYgbrSx7/GeN9Aza7IJocq3tGj daBzjebfPpeZK2b6K9vVJ79UzVslblutD8uXnjvsSX3aZtZsXq/a46t+kSStDUnoQNTw 4Z5oVcuy8tNBuG79Xzguo24JY+1E/CkGPUjtceQsuZ4vaO5eRcSxyJgIFDZlT1cOB1Wl nAN6hGolMNmVEeoKOnN4qnJHB0mMPYUn4MTGrgrn/+NxWoCcyud5UdpA+u2JI2EJrCUk 8AxrNbCVE2lbvrxmYSN3/m1EthVrLZUvkBhmvYYjcnWfWCzxwk6gX2nunPhHiN3Z4DyH Vzfw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f28-v6si15926507plj.255.2018.05.03.17.04.23; Thu, 03 May 2018 17:04:37 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751240AbeEDADC (ORCPT + 99 others); Thu, 3 May 2018 20:03:02 -0400 Received: from mx2.suse.de ([195.135.220.15]:33047 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751116AbeEDADB (ORCPT ); Thu, 3 May 2018 20:03:01 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id A07EFAFB3; Fri, 4 May 2018 00:02:59 +0000 (UTC) Date: Fri, 4 May 2018 00:02:58 +0000 From: "Luis R. Rodriguez" To: Mimi Zohar Cc: linux-integrity@vger.kernel.org, Hans de Goede , Ard Biesheuvel , Peter Jones , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, David Howells , "Luis R . Rodriguez" , Kees Cook , Matthew Garrett , Andres Rodriguez , Greg Kroah-Hartman Subject: Re: [PATCH 1/6] firmware: permit LSMs and IMA to fail firmware sysfs fallback loading Message-ID: <20180504000258.GP27853@wotan.suse.de> References: <1525182503-13849-1-git-send-email-zohar@linux.vnet.ibm.com> <1525182503-13849-2-git-send-email-zohar@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1525182503-13849-2-git-send-email-zohar@linux.vnet.ibm.com> User-Agent: Mutt/1.6.0 (2016-04-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org If you can add Andres Rodriguez , and Greg to your Cc list in the future patches that'd be appreciated. On Tue, May 01, 2018 at 09:48:18AM -0400, Mimi Zohar wrote: > Add an LSM hook prior to allowing firmware sysfs fallback loading. > > Signed-off-by: Mimi Zohar > Cc: Luis R. Rodriguez > Cc: David Howells > Cc: Kees Cook > Cc: Matthew Garrett > --- > drivers/base/firmware_loader/fallback.c | 7 +++++++ > include/linux/fs.h | 1 + > 2 files changed, 8 insertions(+) > > diff --git a/drivers/base/firmware_loader/fallback.c b/drivers/base/firmware_loader/fallback.c > index 31b5015b59fe..23d2af30474e 100644 > --- a/drivers/base/firmware_loader/fallback.c > +++ b/drivers/base/firmware_loader/fallback.c > @@ -651,6 +651,8 @@ static bool fw_force_sysfs_fallback(unsigned int opt_flags) > > static bool fw_run_sysfs_fallback(unsigned int opt_flags) > { > + int ret; > + > if (fw_fallback_config.ignore_sysfs_fallback) { > pr_info_once("Ignoring firmware sysfs fallback due to sysctl knob\n"); > return false; > @@ -659,6 +661,11 @@ static bool fw_run_sysfs_fallback(unsigned int opt_flags) > if ((opt_flags & FW_OPT_NOFALLBACK)) > return false; > > + /* Also permit LSMs and IMA to fail firmware sysfs fallback */ > + ret = security_kernel_read_file(NULL, READING_FIRMWARE_FALLBACK); > + if (ret < 0) > + return ret; > + > return fw_force_sysfs_fallback(opt_flags); > } > > diff --git a/include/linux/fs.h b/include/linux/fs.h > index 760d8da1b6c7..dc16a73c3d38 100644 > --- a/include/linux/fs.h > +++ b/include/linux/fs.h > @@ -2810,6 +2810,7 @@ extern int do_pipe_flags(int *, int); > id(UNKNOWN, unknown) \ > id(FIRMWARE, firmware) \ > id(FIRMWARE_PREALLOC_BUFFER, firmware) \ > + id(FIRMWARE_FALLBACK, firmware) \ If you're going to add this perhaps FIRMWARE_FALLBACK_SYSFS as we may later get FIRMWARE_FALLBACK_EFI. Luis