Received: by 2002:a05:6602:2086:0:0:0:0 with SMTP id a6csp3290512ioa; Tue, 26 Apr 2022 00:05:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz2jzBhHSJd3uRPNcOZihYB3J2rYpt7R7Hh2h1C6Lc00zmeE/EaMy/KjNmeNoV3PWLzbMic X-Received: by 2002:a63:d57:0:b0:39e:11d0:ca1f with SMTP id 23-20020a630d57000000b0039e11d0ca1fmr18111850pgn.182.1650956735723; Tue, 26 Apr 2022 00:05:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650956735; cv=none; d=google.com; s=arc-20160816; b=t/WSfzmXnEMNf5MScRyvsDYvLMnjpls7A3AL82MSAlA2EuSVHCxRmYYV2C9T+pShyL imjja6h3iocqFhRsbTxURifkJ1lHpPgpdeuxQh6NkKSOsh8ooe73W1Z8YLMRJ56MT/wZ IpDeBmim6RMauj3Ah2vHmYtVolS8ggDEHvHsaqcd5t91sw4g4Jt5Jl3H8vNYh9+5iFAM fpbl+/beY1zHUleQSasGK5DLZAVpAKc6dMJgFeDsqDqopnY3/p7dNMcTG+wotRykCGGE 5yF2TQq5OEUZZWtuGdH1fisGW27EmMxkCIDK6Xa2oL2SoVLwxBzIIvC4jbb0YbtNC5fo kvCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=W0GcaF8LUNtQ/VcGNv7yf0Gg7VDi4U2EzhXVUK76yEg=; b=Nc85Xv1uSPquF6NaL5vmrABTxRzill++3/nE32Xu+N0yd4hryxxop/TsuZdcgwX2Rp 4pr8xEyru0KBJ1krj7UbvjaEYeQLRov3kh/4a12+G9kdK0elnz7vIdv0StbZhBhLKMkG O72Q5d8D6IfhRm8kDynYqPiRX2bzLB1tPlqy4vHy5F7XbesGb/1iAncV6t0ODusUiQ/D Jgbwbi46eue9qzuIdiJu2Z/4Pet+VvRrLFVFWTIhjsYac1C0ml1se0Hi2Qe7EV/3PK3L NM7uXxvKXAETo5N7UYrC7Da1ko/DfYD3dEZ4qND/3a+2l9q1VBPEjhmKOkvDEsJIjThO 88jw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=njLi7DoI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id rj5-20020a17090b3e8500b001ca9946de5dsi1593434pjb.56.2022.04.26.00.05.20; Tue, 26 Apr 2022 00:05:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=njLi7DoI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238703AbiDZEWY (ORCPT + 99 others); Tue, 26 Apr 2022 00:22:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37434 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229885AbiDZEWX (ORCPT ); Tue, 26 Apr 2022 00:22:23 -0400 Received: from mail-yw1-x112d.google.com (mail-yw1-x112d.google.com [IPv6:2607:f8b0:4864:20::112d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 112FE31909 for ; Mon, 25 Apr 2022 21:19:17 -0700 (PDT) Received: by mail-yw1-x112d.google.com with SMTP id 00721157ae682-2f7d621d1caso58349287b3.11 for ; Mon, 25 Apr 2022 21:19:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=W0GcaF8LUNtQ/VcGNv7yf0Gg7VDi4U2EzhXVUK76yEg=; b=njLi7DoIAgYOwTX3faFgIDrku+P0ZmnRNcTGq7I3qUSmwUMsnLbEb1+i5FJRtHG9KP b0KQjHU59aK6VFLy9n9bNXp9O9BSYLxERSEWkZq87GAuP+ybEUAo6umNBMiDtOxXds3A 7LbA5TzBtmJJOKPKs5uKdHVwPg40ILTmfxDdgywrZl4Lpuc/X9xu7iDjCpbyRmfEc+DO /pmGYrqaaKtd6LkU+HsqXVEw4pxLgxns7YDexb3YDBxPDt6/ogBbSrXah8C3lCJ3QPcV 7VuuIbquM7j+6FzFmxzOM/8Fvms4UH4V7sxjrdUfCRfbBn4/M3kzXMhQ4g2lLUY9Kxrb p5yQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=W0GcaF8LUNtQ/VcGNv7yf0Gg7VDi4U2EzhXVUK76yEg=; b=qASUG9tEGYhJXwONwDn7zn6anexvWUof9qkTGsPeyOeMGacfRuZLMRPPd74XE9Qv2r wFp7sm8YYVJY9bbYpJJPx+UJ/JcZKLw0ujSduQ6lZPDIR5ZRW6ZZupvT6dw5rMD6tZEQ pz0BC8tqX+yLb2YfAwEltksAlraJ99e6EgsJDQhj4kEMaFkHvdCLBULSjXvUM7yabS54 2JUkMIQw1wvFiZfjxlc8XIqN9Hk34KvU4b0AalztRT+t4dy3xKDNaN9SCQ4NFNn2y5JO p8U18fz1nNzeikCxBPc0RYk0uLRy9SPMkRM8fMpEgZbXff4DO487kRqzIXpEVRM9fGtS gbXg== X-Gm-Message-State: AOAM532M8qXibAGjxmkbeZsL5gYliZ3OOXrBR4oSqOB9Tr9A4RGbqjZP +yCi4lx7qalZq/YxHkYE0HAEF8iRO4LgmHQ00q8Riw== X-Received: by 2002:a81:7b05:0:b0:2f4:e45a:b06e with SMTP id w5-20020a817b05000000b002f4e45ab06emr19622038ywc.458.1650946756147; Mon, 25 Apr 2022 21:19:16 -0700 (PDT) MIME-Version: 1.0 References: <20220422013215.2301793-1-tweek@google.com> In-Reply-To: From: =?UTF-8?Q?Thi=C3=A9baud_Weksteen?= Date: Tue, 26 Apr 2022 14:18:59 +1000 Message-ID: Subject: Re: [PATCH v2] firmware_loader: use kernel credentials when reading firmware To: Luis Chamberlain Cc: Greg Kroah-Hartman , Jeffrey Vander Stoep , Saravana Kannan , Alistair Delva , Adam Shih , SElinux list , linux-kernel Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > Can you elaborate on the last sentence? It's unclear how what you > describe is used exactly to allow driver to use direct filesystem > firmware loading. I realize my use of the word "device" here was unfortunate. I meant devices as Android devices/systems. This may have contributed to the confusion. Previously, Android systems were not setting up the firmware_class.path command line argument. It means that the userspace fallback was always kicking-in when a driver called request_firmware. This was handled by the ueventd process on Android, which is generally given access to all firmware files. Now that more devices are setting up firmware_class.path, the call to request_firmware will end up using kernel_read_file_from_path_initns, which would have used the current process credentials. > > And, given the feedback from Android it would seem this is a fix > which likely may be desirable to backport to some stable kernels? Yes, that's right. Thanks