Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp1675535ioo; Sun, 22 May 2022 23:59:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwe6Qovt/fZSGGGZWzNw68vISiainJKQIiCYoOgFJFdHWFRTTcVP2nqBwPoUB4bDEhjKz06 X-Received: by 2002:a17:90b:2250:b0:1df:622a:73b with SMTP id hk16-20020a17090b225000b001df622a073bmr25412159pjb.171.1653289182837; Sun, 22 May 2022 23:59:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653289182; cv=none; d=google.com; s=arc-20160816; b=vvSdIcwP4czNB0ek81/LIie03V6ukWmYl+24Y7VOIUeSjOcjp0iPzx5iBPI1kAOoN7 VP2PB8tU1kHYjznKfPAEnahEk3XiECPErz0cYqolX9bvGfqhig+zR2/ymlufoKwMUW1U XB052NFnPkiIBPDUeSCfV03xievWTcjdaYMbrJOv0TZO70BAmKWjDoNyGiCcttPLQW6R 9x5m/vJKwskpBz7LJlBc9m0SMHNsXrH/E90PWcNvEv9W8SndVvk8Scft9aj2xj5Rqo9K H1iozJli48HjWjY/yf1v0qs2A+qCstxFZd4Iezqp3ShK7XXt/95CJ6V72f6AIYHADTmh cGfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from:dkim-signature; bh=TOwfscKYdwdC2haCLPjRwmo2HHPTOP6220mJAoVyel4=; b=momDZquSJtXNAsi18IvU8UPBgboRgO0us4PpajDnAsljeeGlYFdhWII8f8I2N8wkVW qdkFBZH+RnWLfcScsQGDRGZOFdHH99tXQMrlIyYHjbQWxZeU07k2Qz+veFMKkpEmlKV4 WOFmErWRwYx/uy6cGK27veK3gPiJC7KAhYLUbZzmLPyxX6PO9jWijh+VFiZIrp7a4zJl JBoGD+aPK1Z9ec1UJrgSvdlc9rlTT7uBv5mmUCvZcjFrQsbSuEw7zjmXumDM96VlNpOP 2zt6veNQQ26MjNVsumRjVPq++k7NhE44u6DRCnpDN+98czfbv6Jv32/5Me3Eq2c4+hY8 GE+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ellerman.id.au header.s=201909 header.b=MOxF9o3M; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id c12-20020a056a00248c00b004fae70007c5si14523994pfv.78.2022.05.22.23.59.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 22 May 2022 23:59:42 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@ellerman.id.au header.s=201909 header.b=MOxF9o3M; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id DEB825F244; Sun, 22 May 2022 23:24:39 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229644AbiEWEaY (ORCPT + 99 others); Mon, 23 May 2022 00:30:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56604 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229539AbiEWEaU (ORCPT ); Mon, 23 May 2022 00:30:20 -0400 Received: from gandalf.ozlabs.org (gandalf.ozlabs.org [150.107.74.76]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4FE60E01E; Sun, 22 May 2022 21:30:18 -0700 (PDT) Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4L64BJ3Qknz4xD8; Mon, 23 May 2022 14:30:16 +1000 (AEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ellerman.id.au; s=201909; t=1653280216; bh=TOwfscKYdwdC2haCLPjRwmo2HHPTOP6220mJAoVyel4=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=MOxF9o3MlQhPhKv68mEIveQsJ6XjKWqV4zneDowZK0AzaiI42uknDJFmnfHihfcy5 70nqhuj9/sAyMsDDmwUatHz1OIcrikGZxUTi0AjrRkxWOvb83fMaZIntdoFvOcfofw IzDTjBQxqRQL0r9ZTijPFNntSyV31dbbi/epqYT0GoXem3A+E7Qnn13J2xZ0U34pN5 wL7Ak4zY0OUkVDEF87DjV4Rmg9MEHSxxz+Jhp+zy2C4fO3E/xxWdOr2g28mGw2DWvW RywZxIxvVqwnI+LAofgXKQW8qsiU0sbPaQYddEec07u8kDJzbp/QaLPVBCcmwXifZW CTc5gwWYcXaBA== From: Michael Ellerman To: Vaibhav Jain , Rob Herring Cc: devicetree@vger.kernel.org, Frank Rowand , linux-kernel@vger.kernel.org, Prakhar Srivastava , Lakshmi Ramasubramanian , linuxppc-dev@lists.ozlabs.org, Thiago Jung Bauermann Subject: Re: [PATCH] powerpc: check previous kernel's ima-kexec-buffer against memory bounds In-Reply-To: <87wnedfaey.fsf@vajain21.in.ibm.com> References: <20220518200547.655788-1-vaibhav@linux.ibm.com> <20220520223025.GA359803-robh@kernel.org> <87wnedfaey.fsf@vajain21.in.ibm.com> Date: Mon, 23 May 2022 14:30:13 +1000 Message-ID: <87fsl0na5m.fsf@mpe.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Vaibhav Jain writes: > Rob Herring writes: >> On Thu, May 19, 2022 at 01:35:47AM +0530, Vaibhav Jain wrote: >>> Presently ima_get_kexec_buffer() doesn't check if the previous kernel's >>> ima-kexec-buffer lies outside the addressable memory range. This can result >>> in a kernel panic if the new kernel is booted with 'mem=X' arg and the >>> ima-kexec-buffer was allocated beyond that range by the previous kernel. >>> The panic is usually of the form below: >>> >>> $ sudo kexec --initrd initrd vmlinux --append='mem=16G' >>> >>> >>> BUG: Unable to handle kernel data access on read at 0xc000c01fff7f0000 >>> Faulting instruction address: 0xc000000000837974 >>> Oops: Kernel access of bad area, sig: 11 [#1] >>> >>> NIP [c000000000837974] ima_restore_measurement_list+0x94/0x6c0 >>> LR [c00000000083b55c] ima_load_kexec_buffer+0xac/0x160 >>> Call Trace: >>> [c00000000371fa80] [c00000000083b55c] ima_load_kexec_buffer+0xac/0x160 >>> [c00000000371fb00] [c0000000020512c4] ima_init+0x80/0x108 >>> [c00000000371fb70] [c0000000020514dc] init_ima+0x4c/0x120 >>> [c00000000371fbf0] [c000000000012240] do_one_initcall+0x60/0x2c0 >>> [c00000000371fcc0] [c000000002004ad0] kernel_init_freeable+0x344/0x3ec >>> [c00000000371fda0] [c0000000000128a4] kernel_init+0x34/0x1b0 >>> [c00000000371fe10] [c00000000000ce64] ret_from_kernel_thread+0x5c/0x64 >>> Instruction dump: >>> f92100b8 f92100c0 90e10090 910100a0 4182050c 282a0017 3bc00000 40810330 >>> 7c0802a6 fb610198 7c9b2378 f80101d0 2c090001 40820614 e9240010 >>> ---[ end trace 0000000000000000 ]--- >>> >>> Fix this issue by checking returned address/size of previous kernel's >>> ima-kexec-buffer against memblock's memory bounds. >>> >>> Fixes: fee3ff99bc67("powerpc: Move arch independent ima kexec functions to >>> drivers/of/kexec.c") ... >> >> But more importantly, how did this commit introduce the problem? It just >> moved the code and didn't have any such check. > Yes, the code didnt have the necessary check to see if the address for > previous kernel IMA buffer is beyond the currently addressable memory. I > have described the problem in patch description. Rob's point is that commit fee3ff99bc67 only moved existing code, the bug already existed. The function was introduced in: 467d27824920 ("powerpc: ima: get the kexec buffer passed by the previous kernel") So that's where the Fixes tag should point. cheers