Received: by 2002:a05:6358:c692:b0:131:369:b2a3 with SMTP id fe18csp4077814rwb; Mon, 31 Jul 2023 00:23:08 -0700 (PDT) X-Google-Smtp-Source: APBJJlFPgQHAbn4Tijd4BDwx+jl4olNO7F54y9OWaJpY8BxGlMfEepMutDBjAdAR3krX0vpIAEls X-Received: by 2002:a05:6a20:5510:b0:137:5d1c:d087 with SMTP id ko16-20020a056a20551000b001375d1cd087mr9056076pzb.4.1690788188325; Mon, 31 Jul 2023 00:23:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690788188; cv=none; d=google.com; s=arc-20160816; b=mnYmgfnns2Lch06Vc48OOmoR2GjRBBRf9RUPdvBxeYxANhX6h8+lewljY3ciscwCm8 QUTs+he+70VOl92UuIAg/5Cbh2tC1LYF4CQoWcKUhEGuPRQiPanSpqu7dg6noopL+ZX+ gU6ac2j5Ix89URqFIQO0FmE/xS94zenGr1En1/+P/o0LVFw7TL3VIFjIyrMQvcJSbNBE K8hNf4Gp/jExaoMo0uTeSS9lCtYA95PmJoNwjzcDMdYiEpTzufZlGYOwRn9FKLS1+rkI Ajm7Acj4Eemj7RYQYXiXE+z87CeQ6wojLBkLOnYXYdiqAX+DQD8vwpadMmo4x03Hy6f+ xf7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=8akGMHqFqX7T+gUZEmXOvoAIZo+dmI+wsqgaBTkWBZQ=; fh=FP+MtMOF0caohqKHcJp5cSg/REyXIfQQaDdRPOMPluE=; b=Z/AQnPw90LvPr3l8EAeeToD5qE/QDaYU/F8hylBDt4rcNDQUsei3WdBxDvHkgDK10K o2yKIlSmPSXXJyGkqwlQV2Ltqs5r8YfCGMZffpVAapszm8Xg9/x58/lmKeXQHlCyDb9O dEGGCXuPxfDRUoWjYrbVWfcJbbFXcEbP9zNsm8wq3yqXb+znVldrqCpdWvj6xD7jgrQ1 M7wNg6o38ibN3ZxXf4xVjPnN8sVN85V3t1ARr47USsViz2KUkX8ltBtiJc5x4KZ6fzGk WefWloZ9VSIqeqOc0W9oUsTPeFJjU4k2Z3+S9CVVLLMSEMwRUjte5Z56CCjmgEWr07oz fNOA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=z1Ab5TBt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id k14-20020a633d0e000000b0053f163363c0si6783472pga.95.2023.07.31.00.22.55; Mon, 31 Jul 2023 00:23:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=z1Ab5TBt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230332AbjGaGw2 (ORCPT + 99 others); Mon, 31 Jul 2023 02:52:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37186 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229716AbjGaGwX (ORCPT ); Mon, 31 Jul 2023 02:52:23 -0400 Received: from mail-pl1-x62a.google.com (mail-pl1-x62a.google.com [IPv6:2607:f8b0:4864:20::62a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AA42F10C7 for ; Sun, 30 Jul 2023 23:52:18 -0700 (PDT) Received: by mail-pl1-x62a.google.com with SMTP id d9443c01a7336-1b8b4749013so33073895ad.2 for ; Sun, 30 Jul 2023 23:52:18 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; t=1690786338; x=1691391138; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=8akGMHqFqX7T+gUZEmXOvoAIZo+dmI+wsqgaBTkWBZQ=; b=z1Ab5TBt4e5ffCbrayRn6i/uztz6MRIhiESmABrJHZhdzPi/smejvM+e6HM5sBTPgt rlGkUoJVl3lP5tZAbnlBIpC1SqjEDe5HC28hd955nkKNoTl8Cs5n8ujiA7J7I2F9Ijmr ysJm2OJ8iBQnt/y+i4t2qyxwUMHx8gydDbkWsKfjtMMcDdUQuT/CBO1RG1PyRfZ2kO2a laJ4MIPcjKiyEMlPsGqbXM1QUGS7faD79zZLeqAg28J54jCWGhkpNK7bFt30QWWuMDpb 6PV515t4mYLEAg3SjXe+0OhejnVXXyTqxACu+KyoYkS3oT6QM7gGDDnD8gN3q+0XMGla 7sZg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1690786338; x=1691391138; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=8akGMHqFqX7T+gUZEmXOvoAIZo+dmI+wsqgaBTkWBZQ=; b=EaSIA2u0TTyxghYz8HV1deFKh1RPXl5Y7sErnzi0AIQYZw80PUobuNvlRDEytqlmt6 bRozEL6Lp+hMqzUkVQGx0P5tBV6O3CHJyydwelwnPe1qrnp7+UBcNm5Uy1g2DA8gISY+ hs0VH57YqDAaE8wV3JN/ZIry7qBbsrUVMEOhctDIxGqVvwAvjM7VQ7+RA+N6tNNs4Ej9 RTFgWuid+6taTKlsFwigSt6Mq/JybUd8UWsrDOIoBCi/Ija8Nd6s0zZmC/NDDBHnhCdV Xv29Mfy+MWTMPau/d2NJqcmQMTenVR7HcDZOJVmLQSvBM1oDiJCdlM8elVa3t+o+jsim wdIw== X-Gm-Message-State: ABy/qLbBhwuSM23S0NQQGljXUxzoJzTWuKaNatE5uZ0ZVjhRqSNr+n6+ cXw8oorxzT/VqlYxYObg09A05A== X-Received: by 2002:a17:902:9893:b0:1bb:9c73:1a3d with SMTP id s19-20020a170902989300b001bb9c731a3dmr8048140plp.21.1690786338202; Sun, 30 Jul 2023 23:52:18 -0700 (PDT) Received: from localhost.localdomain (fp9875a45d.knge128.ap.nuro.jp. [152.117.164.93]) by smtp.gmail.com with ESMTPSA id kb14-20020a170903338e00b001b8ad8382a4sm7706245plb.216.2023.07.30.23.52.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 30 Jul 2023 23:52:17 -0700 (PDT) From: Masahisa Kojima To: Ard Biesheuvel , Jens Wiklander , Jan Kiszka , Sumit Garg , linux-kernel@vger.kernel.org, op-tee@lists.trustedfirmware.org Cc: Ilias Apalodimas , Johan Hovold , Masahisa Kojima , Jeremy Kerr , linux-efi@vger.kernel.org Subject: [PATCH v7 5/5] efivarfs: force RO when remounting if SetVariable is not supported Date: Mon, 31 Jul 2023 15:50:40 +0900 Message-Id: <20230731065041.1447-6-masahisa.kojima@linaro.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20230731065041.1447-1-masahisa.kojima@linaro.org> References: <20230731065041.1447-1-masahisa.kojima@linaro.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ilias Apalodimas If SetVariable at runtime is not supported by the firmware we never assign a callback for that function. At the same time mount the efivarfs as RO so no one can call that. However, we never check the permission flags when someone remounts the filesystem as RW. As a result this leads to a crash looking like this: $ mount -o remount,rw /sys/firmware/efi/efivars $ efi-updatevar -f PK.auth PK [ 303.279166] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 [ 303.280482] Mem abort info: [ 303.280854] ESR = 0x0000000086000004 [ 303.281338] EC = 0x21: IABT (current EL), IL = 32 bits [ 303.282016] SET = 0, FnV = 0 [ 303.282414] EA = 0, S1PTW = 0 [ 303.282821] FSC = 0x04: level 0 translation fault [ 303.283771] user pgtable: 4k pages, 48-bit VAs, pgdp=000000004258c000 [ 303.284913] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000 [ 303.286076] Internal error: Oops: 0000000086000004 [#1] PREEMPT SMP [ 303.286936] Modules linked in: qrtr tpm_tis tpm_tis_core crct10dif_ce arm_smccc_trng rng_core drm fuse ip_tables x_tables ipv6 [ 303.288586] CPU: 1 PID: 755 Comm: efi-updatevar Not tainted 6.3.0-rc1-00108-gc7d0c4695c68 #1 [ 303.289748] Hardware name: Unknown Unknown Product/Unknown Product, BIOS 2023.04-00627-g88336918701d 04/01/2023 [ 303.291150] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 303.292123] pc : 0x0 [ 303.292443] lr : efivar_set_variable_locked+0x74/0xec [ 303.293156] sp : ffff800008673c10 [ 303.293619] x29: ffff800008673c10 x28: ffff0000037e8000 x27: 0000000000000000 [ 303.294592] x26: 0000000000000800 x25: ffff000002467400 x24: 0000000000000027 [ 303.295572] x23: ffffd49ea9832000 x22: ffff0000020c9800 x21: ffff000002467000 [ 303.296566] x20: 0000000000000001 x19: 00000000000007fc x18: 0000000000000000 [ 303.297531] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaaac807ab54 [ 303.298495] x14: ed37489f673633c0 x13: 71c45c606de13f80 x12: 47464259e219acf4 [ 303.299453] x11: ffff000002af7b01 x10: 0000000000000003 x9 : 0000000000000002 [ 303.300431] x8 : 0000000000000010 x7 : ffffd49ea8973230 x6 : 0000000000a85201 [ 303.301412] x5 : 0000000000000000 x4 : ffff0000020c9800 x3 : 00000000000007fc [ 303.302370] x2 : 0000000000000027 x1 : ffff000002467400 x0 : ffff000002467000 [ 303.303341] Call trace: [ 303.303679] 0x0 [ 303.303938] efivar_entry_set_get_size+0x98/0x16c [ 303.304585] efivarfs_file_write+0xd0/0x1a4 [ 303.305148] vfs_write+0xc4/0x2e4 [ 303.305601] ksys_write+0x70/0x104 [ 303.306073] __arm64_sys_write+0x1c/0x28 [ 303.306622] invoke_syscall+0x48/0x114 [ 303.307156] el0_svc_common.constprop.0+0x44/0xec [ 303.307803] do_el0_svc+0x38/0x98 [ 303.308268] el0_svc+0x2c/0x84 [ 303.308702] el0t_64_sync_handler+0xf4/0x120 [ 303.309293] el0t_64_sync+0x190/0x194 [ 303.309794] Code: ???????? ???????? ???????? ???????? (????????) [ 303.310612] ---[ end trace 0000000000000000 ]--- Fix this by adding a .reconfigure() function to the fs operations which we can use to check the requested flags and deny anything that's not RO if the firmware doesn't implement SetVariable at runtime. Fixes: f88814cc2578 ("efi/efivars: Expose RT service availability via efivars abstraction") Signed-off-by: Ilias Apalodimas --- fs/efivarfs/super.c | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/fs/efivarfs/super.c b/fs/efivarfs/super.c index 0f6e4d223aea..942e748a4e03 100644 --- a/fs/efivarfs/super.c +++ b/fs/efivarfs/super.c @@ -15,6 +15,7 @@ #include #include #include +#include #include "internal.h" @@ -300,8 +301,19 @@ static int efivarfs_get_tree(struct fs_context *fc) return get_tree_single(fc, efivarfs_fill_super); } +static int efivarfs_reconfigure(struct fs_context *fc) +{ + if (!efivar_supports_writes() && !(fc->sb_flags & SB_RDONLY)) { + pr_err("Firmware does not support SetVariableRT. Can not remount with rw\n"); + return -EINVAL; + } + + return 0; +} + static const struct fs_context_operations efivarfs_context_ops = { .get_tree = efivarfs_get_tree, + .reconfigure = efivarfs_reconfigure, }; static int efivarfs_init_fs_context(struct fs_context *fc) -- 2.30.2