All of lore.kernel.org
 help / color / mirror / Atom feed
From: Greg KH <greg@kroah.com>
To: Ran Shalit <ranshalit@gmail.com>
Cc: Kees Cook <keescook@chromium.org>,
	"kernel-hardening@lists.openwall.com"
	<kernel-hardening@lists.openwall.com>
Subject: Re: [kernel-hardening] hardening mmc driver
Date: Sun, 20 Aug 2017 09:59:46 -0700	[thread overview]
Message-ID: <20170820165946.GA18709@kroah.com> (raw)
In-Reply-To: <CAJ2oMh+XPRDu_+VxZ1+thNnSpz9S1GXjNvng8+mWDH3GxZfu1Q@mail.gmail.com>

On Sun, Aug 20, 2017 at 09:53:00AM +0300, Ran Shalit wrote:
> On Fri, Aug 18, 2017 at 11:44 PM, Kees Cook <keescook@chromium.org> wrote:
> > On Thu, Aug 17, 2017 at 10:57 PM, Ran Shalit <ranshalit@gmail.com> wrote:
> >> Hello,
> >
> > Hi!
> >
> >> What action should be taken to make mmc driver secured ?
> >>
> >> If there any wiki or document, which can help to understand better
> >> when a driver (like mmc)  is considered secured ?
> >
> > I don't have any specific pointers at the moment, but I think the main
> > focus for drivers (or really any software) is being extremely careful
> > with data processing and the validation of command arguments. Never
> > assume the commands you're getting will follow an expected protocol:
> > pretend the device at the other end of the bus (or the bus itself!) is
> > trying to attack the driver. Same for any commands coming from
> > userspace.
> >
> > Are there particular things you're concerned about for MMC security?
> >
> 
> Hello Kees,
> 
> Thank you very much for your feedback.
> I've found an interesing article by Intel, which tried to define and
> strandarize hardening of device driver.
> https://software.intel.com/sites/default/files/m/d/4/1/d/8/matassa.pdf
> I have no special concern now for the driver, except trying to grasp
> better how to make a driver "secured".
> I will follow the article guidelines and your comment at the moment.

Please note the date of that article, 2002, so some things in there
might not be valid anymore, and some are flat out wrong (hint, never use
'volatile' in the kernel, or anywhere really...).  But overall, it's a
good place to start.

good luck!

greg k-h

      parent reply	other threads:[~2017-08-20 16:59 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-08-18  5:57 [kernel-hardening] hardening mmc driver Ran Shalit
2017-08-18 20:44 ` Kees Cook
2017-08-20  6:53   ` Ran Shalit
2017-08-20  7:04     ` Ran Shalit
2017-08-20 16:59     ` Greg KH [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170820165946.GA18709@kroah.com \
    --to=greg@kroah.com \
    --cc=keescook@chromium.org \
    --cc=kernel-hardening@lists.openwall.com \
    --cc=ranshalit@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.