Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1006267imm; Sat, 14 Jul 2018 19:35:11 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfNpAbdOeScJg1hKyZ8t0gWmyV17ES6jPu+j4/vbe1uObqUgQWHOmB6xRRsREwTpB+YLy6K X-Received: by 2002:a62:e00a:: with SMTP id f10-v6mr13021689pfh.208.1531622111026; Sat, 14 Jul 2018 19:35:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531622110; cv=none; d=google.com; s=arc-20160816; b=WInXbZYseEwZIqKv6j9mrtnsM/srcBKgGDC/9dJgCO33aWSljp1Br3hY0cp2wZdCfX j/18k9j/U1na3bDS1rzQZyEc/RuHck+fGpbA3yUZq971xGGjDZD946TbX82l4RujiBzS 1pajy3nDzNOqx3qYVv57g0E3m+NPsleZ8p5KqBZ4qvcQaJCYnIjq5X1CvV88P3ooHCTF 06bEdOlpX+SbicUMsi5wOpXYHLD/ZaCrrVplZo7wBx0UiNT76jvcE+3X1NwxkifcGB85 ZL+rvbMCKkaXKZh34DOJlS4Oi+VsJ8zyiGNsqDtX0PTK+eCpAE3dKvyn/qQyd3Hb0iQM Ah8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature:dkim-signature :arc-authentication-results; bh=EVmZK/bGRThrZmexRbVczgiLqbz8TsVxazjB15G9JMs=; b=LgAEm8Ne3f19PI/vBGkXUHJqZT4ZyXUbYOFHHmuAYDroyNJftpAkk7oBcgJ5lMNBCx 8He887dqrwuxThthHwiuzDYz/L79FtgepO41MnKSWSiqQYAFOj/eTIFrdUbGn6bdIKiO TkUV185EK0XYbG66eX4IkwK7MxAuoTn/8Hwg4sojrTNDlP9wAq4I283ex+GHW5g7xupK LV4/5lD0fT/vFwF7UZGHJPVXJe2biu4vgvKDboetwPmXOqeGAkZ14d3Yg05LVJbwrGi+ MkgNeRqH7eqNnGR7l30Iw6yhjCqIAcy8sN3V5VLoyQYxZe5ehNDGJsY+bgsLdeOQKcwR Znxg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@google.com header.s=20161025 header.b=RdrhGLDO; dkim=fail header.i=@chromium.org header.s=google header.b=C7j7fzDk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b31-v6si26569311pgl.437.2018.07.14.19.34.55; Sat, 14 Jul 2018 19:35:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@google.com header.s=20161025 header.b=RdrhGLDO; dkim=fail header.i=@chromium.org header.s=google header.b=C7j7fzDk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732723AbeGOCze (ORCPT + 99 others); Sat, 14 Jul 2018 22:55:34 -0400 Received: from mail-yb0-f196.google.com ([209.85.213.196]:42285 "EHLO mail-yb0-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731978AbeGOCzd (ORCPT ); Sat, 14 Jul 2018 22:55:33 -0400 Received: by mail-yb0-f196.google.com with SMTP id c10-v6so12488604ybf.9 for ; Sat, 14 Jul 2018 19:34:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=EVmZK/bGRThrZmexRbVczgiLqbz8TsVxazjB15G9JMs=; b=RdrhGLDOQvyAdUPyg2VNMv9D657Viu/CtPJ6M72FvMfsfQ65/xnovq5giPG3nyrFtK yTojqBNMY8b1RioGaZViz6NmAL+6OIlsDwxvVsPQKPccynl7z3Xu+heSTRkF2uZJNn3z cLdv/K4TVgTNQGFV6HCjXiV7j92FR5wrL6l1EaiBk5XTFeZOEi63EimirQR9Lp6Mwf1n AKWARvYLqFQZeeJ7yKsXVYv4+FGxMovE9uLfbz7qqV07w0ExPcUXIt1V6Zzh68uLP3UM pk/aB4GOo4lY4iPXgKFDz4To4CikC8kip5V8bcyfnhQ1jMbujsUnggbjqqKrbPQso+5w 2I5w== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=EVmZK/bGRThrZmexRbVczgiLqbz8TsVxazjB15G9JMs=; b=C7j7fzDkgP0zwWI7LG01yP2JOI2nlcVdz9dcsMZ4WL8Mi0UfhTWhIHL1fGUPo2aJkd tKnlVQsoyYZhs+z2hs8ktCCf9B5tJS4xucId1N4fa4iBQXyV8DGtgXtyY5s5zk4iNtDy Nd6oS4nZ82EIl7fh7lJQGPbHhCOgm40/M7Tn4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=EVmZK/bGRThrZmexRbVczgiLqbz8TsVxazjB15G9JMs=; b=XkYIPr56OptDm6pBX6dwx7OFi6ptkQE7ZjHuHXuJw4nFE/mPEbyHPmUJ3KudwaB7BA cjxNTi4Qmtyn2iZRim4ITOzusk/6vQZMkYyMd6co6xJIn5C5hufd3aJmQCv5IkH/dd77 ggdCcxhBC83kkZ1q79xcRRXqIdcxfgTHidbfO58yEAWB0CRnm7Fc8ZEHx7QGBtLdnBIR xKawNhFx6ixaN2kyw7Nw3PLv97aS4q9f7M7XIGmGySncAY6BSYLxspCOSbvLauXq2sfJ a0/rZ3tqqOsoipeUiN/4FzswzEVwKtVJ2toGI27Pr0bzr00Gr7MUe2CoE9QfEmEPAVF6 Hsew== X-Gm-Message-State: AOUpUlFoAASI+0w3bIqNVbYbX09yt0ZwKA477k4mrdEuHDConYKUHmb0 bn4B4yOrsYbNfgsnhWTOlSnLGGN61DfpkhL5GdQA7QrUB88= X-Received: by 2002:a25:ce8e:: with SMTP id x136-v6mr6131656ybe.118.1531622060172; Sat, 14 Jul 2018 19:34:20 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a25:6602:0:0:0:0:0 with HTTP; Sat, 14 Jul 2018 19:34:19 -0700 (PDT) In-Reply-To: <1531505163-20227-9-git-send-email-zohar@linux.vnet.ibm.com> References: <1531505163-20227-1-git-send-email-zohar@linux.vnet.ibm.com> <1531505163-20227-9-git-send-email-zohar@linux.vnet.ibm.com> From: Kees Cook Date: Sat, 14 Jul 2018 19:34:19 -0700 X-Google-Sender-Auth: ufNdvUiMxR3UvG97A8SSI7hVITY Message-ID: Subject: Re: [PATCH v6 8/8] ima: based on policy warn about loading firmware (pre-allocated buffer) To: Mimi Zohar Cc: linux-integrity , linux-security-module , LKML , "Luis R . Rodriguez" , Eric Biederman , Kexec Mailing List , Andres Rodriguez , Greg Kroah-Hartman , "Luis R . Rodriguez" , Stephen Boyd , Bjorn Andersson , Ard Biesheuvel Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 13, 2018 at 11:06 AM, Mimi Zohar wrote: > Some systems are memory constrained but they need to load very large > firmwares. The firmware subsystem allows drivers to request this > firmware be loaded from the filesystem, but this requires that the > entire firmware be loaded into kernel memory first before it's provided > to the driver. This can lead to a situation where we map the firmware > twice, once to load the firmware into kernel memory and once to copy the > firmware into the final resting place. > > To resolve this problem, commit a098ecd2fa7d ("firmware: support loading > into a pre-allocated buffer") introduced request_firmware_into_buf() API > that allows drivers to request firmware be loaded directly into a > pre-allocated buffer. > > Do devices using pre-allocated memory run the risk of the firmware being > accessible to the device prior to the completion of IMA's signature > verification any more than when using two buffers? (Refer to mailing list > discussion[1]). > > Only on systems with an IOMMU can the access be prevented. As long as > the signature verification completes prior to the DMA map is performed, > the device can not access the buffer. This implies that the same buffer > can not be re-used. Can we ensure the buffer has not been DMA mapped > before using the pre-allocated buffer? > > [1] https://lkml.org/lkml/2018/7/10/56 > > Signed-off-by: Mimi Zohar > Cc: Luis R. Rodriguez > Cc: Stephen Boyd > Cc: Bjorn Andersson > Cc: Ard Biesheuvel I can't decide if it's worth adding the link (maybe using the lkml.kernel.org url[1]) directly in the code or not. Either way: Reviewed-by: Kees Cook -Kees [1] https://lkml.kernel.org/r/CAKv+Gu-knHeBRGqo+2pb3X9cCjwovEykoXUf=DZyP7aJpoS60A@mail.gmail.com -- Kees Cook Pixel Security