Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp187066ioo; Thu, 26 May 2022 01:04:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyymWWNdM0ozbRMEX2rQsY0GOzQE7Le0Rm/XZHShBiXwMRXbMhhKvcscD0IKJsqpfwfbJoF X-Received: by 2002:a17:902:7296:b0:151:62b1:e2b0 with SMTP id d22-20020a170902729600b0015162b1e2b0mr36403297pll.165.1653552274621; Thu, 26 May 2022 01:04:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653552274; cv=none; d=google.com; s=arc-20160816; b=krlNV9spEaXLM6RAuQrw0TTmfryhFMX9vMt4CGeiHH/CcXh46SHF5jNIfi1GY6gW+6 36HFaSVVK5J2Ua5HkvaCvad5JYlxb2l/p62Ivvdi+mDhx//5BHe/p12G5Wa/NxPTeilJ yYaINcMEqBpVSKK8lFrccZCLc0kll5iJoiX4TmKbGOiEni9QK7RWDy7MM07dYdk/7dJ/ APdXUvcLHwlMWYNtSNNdRcne/1pIdHiJ/8LGcnbSi018j3FcqPYtNoqB4JqjiEgeRRfq qzB7KPPnhfbLVZSoTum4eCGSdDczyzylYDWTuVAtPy1j7Tug2lHCXj7Ln8j2e89blXA1 mesg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=nIzC1T+B7FDF0YpbJTKwhnFmPynXYVhFmPj3hCsebHQ=; b=EQndE8lLpzkImOvPOlY0E6Kx6dgvuvYFo/qNbzTRmlcVaZzJy3jvHvugQcnfb/0b7H rugY1hlR94fvlE7gGBdDNXAxUWh1cACFO3oBnuBBnRTtTE9Ee/Z5bjixM8By3zDKOgt7 rx9c6fqoXFL9IwBTarqwetn01TjHkne91eXK2qB+qAjtD84K5JM6zhZK/uk8Wu574cOQ pZWTb6Gqa+PsIEPcMjMoo/k7mNfxrtnlZPXcPC5S+fykuwmHg4N4mKPrc1bS67JoJ3cc NvewZjagRHMm360gIPM0LLrBJvgutllHO2vjDGOeEfYsUEuaX8krrH1bASd0pkYc72yD m9KQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id k23-20020a63d117000000b003ab7a1a4f11si1520693pgg.315.2022.05.26.01.04.22; Thu, 26 May 2022 01:04:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239558AbiEZBwp (ORCPT + 99 others); Wed, 25 May 2022 21:52:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35982 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235094AbiEZBwn (ORCPT ); Wed, 25 May 2022 21:52:43 -0400 Received: from mail-ot1-f52.google.com (mail-ot1-f52.google.com [209.85.210.52]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D5A10A76E7; Wed, 25 May 2022 18:52:42 -0700 (PDT) Received: by mail-ot1-f52.google.com with SMTP id h9-20020a056830400900b0060b03bfe792so127918ots.12; Wed, 25 May 2022 18:52:42 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=nIzC1T+B7FDF0YpbJTKwhnFmPynXYVhFmPj3hCsebHQ=; b=GD+bJuXSxL7TFNzl4e67maAAGj0HA9HwFjAvln4BF7HKQLb2Lufbye3Oge8TxSJ2R/ tjBclEA1FR0Lxc6758C0kDx4F+p2QQbbTVBuFCF6Wxk2qasaSW2VS1VLjicuL+h0NF+I 4wdXLmNccDyAm6U9AGXPJjeKQbzdkEX5CeS5gmosq3xbr7WyA3/jraI/6mkuLPcIGK6B UIowYjrCi3SZvwJ2mhjsfMeM6SrfDCB78POJnveC6Zm7Z/tQhpR3g6ARqy49genEOPIT 3qQpBz19DvjMPc1Pt1ToZmwWPcuWhHFlCtAYG9TxfH1y8yiOm+4dnPp/tyOwVjmHgWm9 e1KA== X-Gm-Message-State: AOAM531lbVeZ7cuS+yHdl0oaOELwukB0NCZaF8IXYwN0N+fIqnSPrDPa qfx75buK96rTVd/SFyUvPg== X-Received: by 2002:a05:6830:164d:b0:60b:3d2a:42de with SMTP id h13-20020a056830164d00b0060b3d2a42demr830293otr.373.1653529962148; Wed, 25 May 2022 18:52:42 -0700 (PDT) Received: from robh.at.kernel.org (66-90-144-107.dyn.grandenetworks.net. [66.90.144.107]) by smtp.gmail.com with ESMTPSA id s3-20020a056808208300b0032ba39d8be6sm202565oiw.14.2022.05.25.18.52.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 25 May 2022 18:52:41 -0700 (PDT) Received: (nullmailer pid 2888797 invoked by uid 1000); Thu, 26 May 2022 01:52:40 -0000 Date: Wed, 25 May 2022 20:52:40 -0500 From: Rob Herring To: Vaibhav Jain Cc: linuxppc-dev@lists.ozlabs.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, "Aneesh Kumar K . V" , Michael Ellerman , Frank Rowand , Prakhar Srivastava , Lakshmi Ramasubramanian , Thiago Jung Bauermann , Robin Murphy Subject: Re: [PATCH v2] of: check previous kernel's ima-kexec-buffer against memory bounds Message-ID: <20220526015240.GA2884362-robh@kernel.org> References: <20220524055042.1527968-1-vaibhav@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220524055042.1527968-1-vaibhav@linux.ibm.com> X-Spam-Status: No, score=-1.2 required=5.0 tests=BAYES_00, FREEMAIL_ENVFROM_END_DIGIT,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 24, 2022 at 11:20:42AM +0530, Vaibhav Jain wrote: > Presently ima_get_kexec_buffer() doesn't check if the previous kernel's > ima-kexec-buffer lies outside the addressable memory range. This can result > in a kernel panic if the new kernel is booted with 'mem=X' arg and the > ima-kexec-buffer was allocated beyond that range by the previous kernel. > The panic is usually of the form below: > > $ sudo kexec --initrd initrd vmlinux --append='mem=16G' > > > BUG: Unable to handle kernel data access on read at 0xc000c01fff7f0000 > Faulting instruction address: 0xc000000000837974 > Oops: Kernel access of bad area, sig: 11 [#1] > > NIP [c000000000837974] ima_restore_measurement_list+0x94/0x6c0 > LR [c00000000083b55c] ima_load_kexec_buffer+0xac/0x160 > Call Trace: > [c00000000371fa80] [c00000000083b55c] ima_load_kexec_buffer+0xac/0x160 > [c00000000371fb00] [c0000000020512c4] ima_init+0x80/0x108 > [c00000000371fb70] [c0000000020514dc] init_ima+0x4c/0x120 > [c00000000371fbf0] [c000000000012240] do_one_initcall+0x60/0x2c0 > [c00000000371fcc0] [c000000002004ad0] kernel_init_freeable+0x344/0x3ec > [c00000000371fda0] [c0000000000128a4] kernel_init+0x34/0x1b0 > [c00000000371fe10] [c00000000000ce64] ret_from_kernel_thread+0x5c/0x64 > Instruction dump: > f92100b8 f92100c0 90e10090 910100a0 4182050c 282a0017 3bc00000 40810330 > 7c0802a6 fb610198 7c9b2378 f80101d0 2c090001 40820614 e9240010 > ---[ end trace 0000000000000000 ]--- > > Fix this issue by checking returned PFN range of previous kernel's > ima-kexec-buffer with pfn_valid to ensure correct memory bounds. > > Fixes: 467d27824920 ("powerpc: ima: get the kexec buffer passed by the previous kernel") > Cc: Frank Rowand > Cc: Prakhar Srivastava > Cc: Lakshmi Ramasubramanian > Cc: Thiago Jung Bauermann > Cc: Rob Herring > Signed-off-by: Vaibhav Jain > > --- > Changelog > ========== > > v2: > * Instead of using memblock to determine the valid bounds use pfn_valid() to do > so since memblock may not be available late after the kernel init. [ Mpe ] > * Changed the patch prefix from 'powerpc' to 'of' [ Mpe ] > * Updated the 'Fixes' tag to point to correct commit that introduced this > function. [ Rob ] > * Fixed some whitespace/tab issues in the patch description [ Rob ] > * Added another check for checking ig 'tmp_size' for ima-kexec-buffer is > 0 > --- > drivers/of/kexec.c | 17 +++++++++++++++++ > 1 file changed, 17 insertions(+) > > diff --git a/drivers/of/kexec.c b/drivers/of/kexec.c > index 8d374cc552be..879e984fe901 100644 > --- a/drivers/of/kexec.c > +++ b/drivers/of/kexec.c > @@ -126,6 +126,7 @@ int ima_get_kexec_buffer(void **addr, size_t *size) > { > int ret, len; > unsigned long tmp_addr; > + unsigned int start_pfn, end_pfn; > size_t tmp_size; > const void *prop; > > @@ -140,6 +141,22 @@ int ima_get_kexec_buffer(void **addr, size_t *size) > if (ret) > return ret; > > + /* Do some sanity on the returned size for the ima-kexec buffer */ > + if (!tmp_size) > + return -ENOENT; > + > + /* > + * Calculate the PFNs for the buffer and ensure > + * they are with in addressable memory. > + */ > + start_pfn = PHYS_PFN(tmp_addr); > + end_pfn = PHYS_PFN(tmp_addr + tmp_size - 1); > + if (!pfn_valid(start_pfn) || !pfn_valid(end_pfn)) { pfn_valid() isn't necessarily RAM, only that you have a struct page AIUI. Maybe page_is_ram() instead? Thanks to Robin for this. Rob